咨询与建议

限定检索结果

文献类型

  • 93 篇 会议
  • 48 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 57 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 26 篇 信息与通信工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 航空宇航科学与技...
    • 5 篇 安全科学与工程
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 12 篇 物理学
    • 8 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
  • 23 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 10 篇 watermarking
  • 9 篇 communication sy...
  • 9 篇 computer graphic...
  • 8 篇 protection
  • 6 篇 computer securit...
  • 6 篇 robustness
  • 5 篇 data security
  • 5 篇 intellectual pro...
  • 5 篇 authentication
  • 5 篇 security
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 internet of thin...
  • 4 篇 laboratories
  • 4 篇 internet
  • 4 篇 information secu...
  • 4 篇 quantum cryptogr...
  • 3 篇 information syst...
  • 3 篇 wireless communi...
  • 3 篇 bandwidth

机构

  • 8 篇 state key labora...
  • 4 篇 department for s...
  • 3 篇 information and ...
  • 3 篇 disaster managem...
  • 3 篇 state key labora...
  • 3 篇 science and tech...
  • 3 篇 university of en...
  • 3 篇 graduate school ...
  • 3 篇 state key labora...
  • 3 篇 department of el...
  • 3 篇 space communicat...
  • 3 篇 privacy engineer...
  • 3 篇 laboratory of sy...
  • 2 篇 faculty of scien...
  • 2 篇 directorate of i...
  • 2 篇 fraunhofer insti...
  • 2 篇 institute for in...
  • 2 篇 department of co...
  • 2 篇 ministry of high...
  • 2 篇 department of ma...

作者

  • 10 篇 gritzalis stefan...
  • 8 篇 kalloniatis chri...
  • 5 篇 guo hong
  • 5 篇 chen ziyang
  • 5 篇 yu song
  • 5 篇 xu bingjie
  • 4 篇 palma david
  • 4 篇 m. arnold
  • 4 篇 sideri maria
  • 3 篇 okada kazunori
  • 3 篇 song yu
  • 3 篇 pang jun
  • 3 篇 m. schmucker
  • 3 篇 hong guo
  • 3 篇 zhang yichen
  • 3 篇 kitsiou angeliki
  • 3 篇 ziyang chen
  • 3 篇 bingjie xu
  • 3 篇 xiangyu wang
  • 3 篇 mouratidis haral...

语言

  • 139 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Security Technology for Graphics and Communication Systems"
144 条 记 录,以下是1-10 订阅
排序:
Line protection systems with 5G communications
Line protection systems with 5G communications
收藏 引用
2024 IEEE PES Innovative Smart Grid Technologies Europe Conference, ISGT EUROPE 2024
作者: Sanchez-Acevedo, Santiago Zerihun, Tesfaye Amare Katoulaei, Mohammad Khalili Høidalen, Hans Kristian Zinner, Thomas Sintef Energy Research Department of Energy Systems Trondheim Norway Norwegian University of Science and Technology Department of Energy Systems Trondheim Norway Norwegian University of Science and Technology Department of Information Security and Communication Technology Trondheim Norway
This paper analyses communications-assisted accelerated line protection scheme using 5G communication between two substations. The primary goal is to eliminate the reliance on traditional wired communication methods t... 详细信息
来源: 评论
An Efficient and Lightweight Commitment Scheme for IoT Data Streams  19
An Efficient and Lightweight Commitment Scheme for IoT Data ...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart systems and the Internet of Things, DCOSS-IoT 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Plagianakos, Vassilis Spathoulas, Georgios University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece University of the Aegean Department of Information and Communication Systems Engineering Samos Greece Department of Information Security and Communication Technology Gjøvik Norway
Data integrity is a crucial property for offering Internet of Things (IoT) services. Usually, this is achieved by assuming a high level of trust in the service provider, a practice that induces negative implications. ... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Compressing Time Series Towards Lightweight Integrity Commitments  8
Compressing Time Series Towards Lightweight Integrity Commit...
收藏 引用
8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Kakarountas, Athanasios Andritsopoulos, Fotis Plagianakos, Vassilis Spathoulas, Georgios University of the Aegean Department of Information and Communication Systems Engineering Samos Greece ITrack Athens Greece University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece Department of Information Security and Communication Technology Gjovik Norway
In the current era of big data, the generation and preservation of time series data has seen widespread adoption in various sectors such as trade, healthcare, and industry. At the same time, data have become a prized ... 详细信息
来源: 评论
Cyber Attack Simulation and Detection in Digital Substation  3
Cyber Attack Simulation and Detection in Digital Substation
收藏 引用
3rd International Conference on Secure Cyber Computing and communications, ICSCCC 2023
作者: Abraham, Doney Yayilgan, Sule Yildirim Holik, Filip Acevedo, Santiago Sanchez Gebremedhin, Alemayehu Norwegian University of Science and Technology Information Security and Communication Technology Gjovik Norway Sintef Energy Research Department of Energy Systems Trondheim Norway Norwegian University of Science and Technology Department of Manufacturing and Civil Engineering Gjovik Norway
Transforming electrical grids into digital systems has brought many advantages, but it has also introduced new vulnerabilities that cyber attackers can exploit. Therefore, early detection of these attacks is crucial t... 详细信息
来源: 评论
Deploying 5G architecture for protection systems in smart distribution grids
Deploying 5G architecture for protection systems in smart di...
收藏 引用
2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022
作者: Adrah, Charles M. Palma, David Kure, Oivind Heegaard, Poul E. Norwegian University of Science and Technology NTNU Department of Information Security and Communication Technology Trondheim Norway University of Oslo UiO Department of Technology Systems Oslo Norway
The evolution in 5G has seen innovative applications in sectors such as energy, transport, manufacturing and healthcare. Within the energy system, several applications have been defined that can benefit from 5G low la... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
A real-time cyber-physical testbed to assess protection system traffic over 5G networks
A real-time cyber-physical testbed to assess protection syst...
收藏 引用
2022 IEEE International Conference on communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2022
作者: Adrah, Charles M. Katoulaei, Mohammad K. Amare, Tesfaye Palma, David Norwegian University of Science and Technology Ntnu Department of Information Security and Communication Technology Trondheim Norway Ntnu Department of Electric Power Systems Trondheim Norway Sintef Energy As Trondheim Norway
The fifth-generation (5G) mobile network promises to offer low latency services. Hence, there is interest in assessing various power distribution grid applications that can be deployed with a 5G infrastructure. This p... 详细信息
来源: 评论
Influence of Access Points’ Height and High Signal Relation in WLAN Fingerprinting-Based Indoor Positioning systems’ Accuracy  1
收藏 引用
26th International Conference on Distributed Computer and communication Networks: Control, Computation, communications, DCCN 2023
作者: Nicholaus, Mrindoko R. Ruambo, Francis A. Masanga, Elijah E. Muthanna, Mohammed Saleh Ali Lashchev, Andrei Computer Science and Engineering Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of Information Systems and Technology Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Research and Development Department Aifrruis Laboratories Mbeya Tanzania United Republic of Institute of Computer Technologies and Information Security Southern Federal University Taganrog347922 Russia
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas... 详细信息
来源: 评论
LightSC: The Making of a Usable security Classification Tool for DevSecOps
arXiv
收藏 引用
arXiv 2024年
作者: Shrestha, Manish Johansen, Christian Johansen, Johanna Department of Technology Systems University of Oslo Norway Department of Information Security and Communication Technologies NTNU Norway Department of Computer Science NTNU Norway
DevSecOps is the extension of DevOps with security training and tools included throughout all the phases of the software development life cycle. DevOps has become a popular way of developing modern software, especiall... 详细信息
来源: 评论