咨询与建议

限定检索结果

文献类型

  • 93 篇 会议
  • 48 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 57 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 26 篇 信息与通信工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 航空宇航科学与技...
    • 5 篇 安全科学与工程
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 12 篇 物理学
    • 8 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
  • 23 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 10 篇 watermarking
  • 9 篇 communication sy...
  • 9 篇 computer graphic...
  • 8 篇 protection
  • 6 篇 computer securit...
  • 6 篇 robustness
  • 5 篇 data security
  • 5 篇 intellectual pro...
  • 5 篇 authentication
  • 5 篇 security
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 internet of thin...
  • 4 篇 laboratories
  • 4 篇 internet
  • 4 篇 information secu...
  • 4 篇 quantum cryptogr...
  • 3 篇 information syst...
  • 3 篇 wireless communi...
  • 3 篇 bandwidth

机构

  • 8 篇 state key labora...
  • 4 篇 department for s...
  • 3 篇 information and ...
  • 3 篇 disaster managem...
  • 3 篇 state key labora...
  • 3 篇 science and tech...
  • 3 篇 university of en...
  • 3 篇 graduate school ...
  • 3 篇 state key labora...
  • 3 篇 department of el...
  • 3 篇 space communicat...
  • 3 篇 privacy engineer...
  • 3 篇 laboratory of sy...
  • 2 篇 faculty of scien...
  • 2 篇 directorate of i...
  • 2 篇 fraunhofer insti...
  • 2 篇 institute for in...
  • 2 篇 department of co...
  • 2 篇 ministry of high...
  • 2 篇 department of ma...

作者

  • 10 篇 gritzalis stefan...
  • 8 篇 kalloniatis chri...
  • 5 篇 guo hong
  • 5 篇 chen ziyang
  • 5 篇 yu song
  • 5 篇 xu bingjie
  • 4 篇 palma david
  • 4 篇 m. arnold
  • 4 篇 sideri maria
  • 3 篇 okada kazunori
  • 3 篇 song yu
  • 3 篇 pang jun
  • 3 篇 m. schmucker
  • 3 篇 hong guo
  • 3 篇 zhang yichen
  • 3 篇 kitsiou angeliki
  • 3 篇 ziyang chen
  • 3 篇 bingjie xu
  • 3 篇 xiangyu wang
  • 3 篇 mouratidis haral...

语言

  • 139 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Security Technology for Graphics and Communication Systems"
144 条 记 录,以下是51-60 订阅
排序:
Towards Few-shot Inductive Link Prediction on Knowledge Graphs: A Relational Anonymous Walk-guided Neural Process Approach
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zicheng Luo, Linhao Pan, Shirui Nguyen, Quoc Viet Hung Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China Department of Data Science and AI Monash University Australia School of Information and Communication Technology Griffith University Australia Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education
Few-shot inductive link prediction on knowledge graphs (KGs) aims to predict missing links for unseen entities with few-shot links observed. Previous methods are limited to transductive scenarios, where entities exist... 详细信息
来源: 评论
Network slicing-based customization of 5G mobile services
arXiv
收藏 引用
arXiv 2022年
作者: Afolabi, Ibrahim Taleb, Tarik Frangoudis, Pantelis A. Bagaa, Miloud Ksentini, Adlen Department of Communications and Networking School of Electrical Engineering Aalto University Finland Faculty of Information Technology and Electrical Engineering Oulu University Finland Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Communication Systems Department EURECOM Sophia Antipolis France
Through network slicing, different requirements of different applications and services can be met. These requirements can be in terms of latency, bandwidth, mobility support, defining service area, as well as security... 详细信息
来源: 评论
Coded Caching Schemes for Multiaccess Topologies via Combinatorial Design
arXiv
收藏 引用
arXiv 2023年
作者: Cheng, Minquan Wan, Kai Elia, Petros Caire, Giuseppe Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China The School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China The Communication Systems Department EURECOM Sophia Antipolis06410 France Electrical Engineering and Computer Science Department Technische Universität Berlin Berlin10587 Germany
This paper studies a multiaccess coded caching (MACC) where the connectivity topology between the users and the caches can be described by a class of combinatorial designs. Our model includes as special cases several ... 详细信息
来源: 评论
Realizing a Downstream-Access Network Using Continuous-Variable Quantum Key Distribution
收藏 引用
Physical Review Applied 2021年 第6期16卷 064051-064051页
作者: Yundi Huang Tao Shen Xiangyu Wang Ziyang Chen Bingjie Xu Song Yu Hong Guo State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronics and Center for Quantum Information Technology Peking University Beijing 100871 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum key distribution (QKD), which enables the secure distribution of symmetric keys between two legitimate parties, is highly useful in future network security. An access network that connects multiple end users w... 详细信息
来源: 评论
Enabling Protection for Critical Infrastructure through security and Privacy in the Industrial Internet of Things
Enabling Protection for Critical Infrastructure through Secu...
收藏 引用
International Conference on communication and Electronics systems (ICCES)
作者: B. Yasotha T. Vijayanandh P Thirumoorthy M.Sangeetha Priya Sasidaran S S.B. Prakalya Department of Data Science and Business Systems SRMIST Kattankulathur Department of Computer Science & Engineering School of Computing Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai Tamil Nadu India Department of Electrical and Electronics Engineering Dhanalakshmi College of Engineering Chennai India Department of Computer Science and Engineering (Cyber Security) Saveetha Engineering College Chennai Department of Information Technology Panimalar Engineering College Chennai Department of Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
Industrial Internet of Things can improve critical infrastructure in energy, transportation, and manufacturing. However, IIoT device and system integration opened security weaknesses that bad actors may exploit, causi... 详细信息
来源: 评论
Autonomous Cyber Defense Agents for NATO: Threat Analysis, Design, and Experimentation
Autonomous Cyber Defense Agents for NATO: Threat Analysis, D...
收藏 引用
MILCOM, Military communications Conference
作者: Alexander Velazquez Roberto Rigolin F. Lopes Adrien Bécue Johannes F. Loevenich Paulo H. L. Rettore Konrad Wrona Information Technology Division U.S. Naval Research Laboratory Washington DC USA Secure Communications & Information (SIX) Thales Deutschland Ditzingen Germany THALES SIX GTS Gennevilliers France Department of Mathematics/Computer Science University of Osnabrück Osnabrück Germany Department of Communication Systems Fraunhofer FKIE Bonn Germany Military University of Technology Warsaw Poland NATO Cyber Security Centre The Hague The Netherlands
This paper discusses the design and implementation of Autonomous Cyber Defense (ACD) agents for Protected Core Networking (PCN). Our solution includes two types of specialized, complementary agents placed in different...
来源: 评论
Seamless Decision-Making in the Big Data Era: A Modular Approach to Integrating IoT, Cloud Computing, and Data Lakes
Seamless Decision-Making in the Big Data Era: A Modular Appr...
收藏 引用
International Conference on Electrical, communication, and Computer Engineering (ICECCE)
作者: Mohamed Zemmouri Fatma Zohra Laalam Okba Kazar Yassine Himeur Adel Oulefki Chahrazad Toumi Wathiq Mansoor Shadi Attala Artificial Intelligence and Information Technologies Laboratory Faculty of New Information and Communication Technologies Kasdi Merbah Ouargla University Ouargla Algeria Department of Computer Science - LINFI Laboratory Mohamed Khider University Biskra Algeria Department of Information Systems and Security - College of Information Technology United Arab Emirate University Abu Dhabi United Arab Emirates College of Engineering and Information Technology University of Dubai Dubai UAE Department of Computer Science University of Sharjah Sharjah United Arab Emirates
The integration of big data with cutting-edge technologies like IoT and Cloud Computing has profoundly influenced various aspects of modern life, including everyday service processes. To facilitate data-driven decisio...
来源: 评论
IoT security Frameworks: A Comparative Review with a Focus on Privacy
IoT Security Frameworks: A Comparative Review with a Focus o...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Abduljaleel Al-Hasnawi Yitong Niu Jamal F. Tawfeq Manas Ranjan Pradhan Mohammed Salahat Taher M. Ghazal Ministry of Higher Education and Scientific Research Baghdad Iraq Department of Communication Technology Engineering College of Information Technology Imam Ja'afar Al-Sadiq University Baghdad Iraq School of Aeronautical Engineering AnYang University Anyang China Department of Medical Instrumentation Technical Engineering Medical Technical College Al-Farahidi University Baghdad Iraq School of Computing Skyline University College University City Sharjah Sharjah UAE College of Engineering and Technology University of Science and Technology of Fujairah Fujairah UAE Computer Science Department Centre for Cyber Physical Systems Khalifa University Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia
The privacy of sensitive data within the Internet of Things (IoT) is at risk due to potential privacy violations. These violations can occur through illegal access by external entities, as well as inadvertent disclosu... 详细信息
来源: 评论
What Do We Know About Our Rights to Data Protection? A Greek Case Study  8th
What Do We Know About Our Rights to Data Protection? A Greek...
收藏 引用
8th e-Democracy International Conference on Safeguarding Democracy and Human Rights in the Digital Age, e-Democracy 2019
作者: Sideri, Maria Fontaras, Athanasios Gritzalis, Stefanos Privacy Engineering and Social Informatics Laboratory Department of Cultural Technology and Communication University of the Aegean Lesvos81100 Greece e-Governance Department National Centre for Scientific Research "Demokritos" Athens15310 Greece Laboratory of Systems Security Department of Digital Systems University of Piraeus Piraeus18534 Greece
Technological developments have led to tools for collecting personal data in a volume and form that in the past would have been difficult to gather. This creates new opportunities for public and private sector agencie... 详细信息
来源: 评论
A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain
arXiv
收藏 引用
arXiv 2022年
作者: Rathee, Geetanjali Ahmad, Farhan Jaglan, Naveen Konstantinou, Charalambos The Department of Computer Science and Engineering Netaji Subhas University of Technology Dwarka Sector-3 New Delhi India The Systems Security Group Centre for Future Transport and Cities Coventry University Warwickshire CV1 5FB United Kingdom The Department of Electronics and Communication Engineering Jaypee University of Technology Waknaghat 173234 India Thuwal 23955-6900 Saudi Arabia
Industrial Internet-of-Things (IIoT) is a powerful IoT application which remodels the growth of industries by ensuring transparent communication among various entities such as hubs, manufacturing places and packaging ... 详细信息
来源: 评论