咨询与建议

限定检索结果

文献类型

  • 11,600 篇 会议
  • 6,863 篇 期刊文献
  • 253 册 图书

馆藏范围

  • 18,716 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,241 篇 工学
    • 8,537 篇 计算机科学与技术...
    • 7,086 篇 软件工程
    • 2,152 篇 信息与通信工程
    • 1,370 篇 控制科学与工程
    • 1,163 篇 生物工程
    • 1,016 篇 电气工程
    • 780 篇 电子科学与技术(可...
    • 775 篇 生物医学工程(可授...
    • 703 篇 光学工程
    • 701 篇 机械工程
    • 427 篇 安全科学与工程
    • 416 篇 仪器科学与技术
    • 413 篇 化学工程与技术
    • 370 篇 动力工程及工程热...
    • 352 篇 建筑学
  • 6,172 篇 理学
    • 3,085 篇 数学
    • 2,066 篇 物理学
    • 1,323 篇 生物学
    • 870 篇 统计学(可授理学、...
    • 675 篇 系统科学
    • 463 篇 化学
  • 3,251 篇 管理学
    • 1,972 篇 管理科学与工程(可...
    • 1,399 篇 图书情报与档案管...
    • 966 篇 工商管理
  • 740 篇 医学
    • 644 篇 临床医学
    • 572 篇 基础医学(可授医学...
    • 345 篇 药学(可授医学、理...
  • 499 篇 法学
    • 387 篇 社会学
  • 338 篇 经济学
    • 335 篇 应用经济学
  • 329 篇 教育学
    • 319 篇 教育学
  • 188 篇 农学
  • 78 篇 文学
  • 51 篇 军事学
  • 28 篇 艺术学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 1,093 篇 computer science
  • 1,089 篇 software enginee...
  • 324 篇 application soft...
  • 291 篇 deep learning
  • 285 篇 computational mo...
  • 258 篇 computer archite...
  • 252 篇 machine learning
  • 249 篇 data mining
  • 222 篇 software
  • 218 篇 software systems
  • 194 篇 training
  • 187 篇 internet of thin...
  • 185 篇 support vector m...
  • 183 篇 accuracy
  • 181 篇 programming
  • 170 篇 feature extracti...
  • 162 篇 educational inst...
  • 159 篇 wireless sensor ...
  • 157 篇 optimization
  • 155 篇 artificial intel...

机构

  • 478 篇 department of ph...
  • 411 篇 cavendish labora...
  • 375 篇 physikalisches i...
  • 359 篇 school of physic...
  • 356 篇 oliver lodge lab...
  • 325 篇 faculty of scien...
  • 317 篇 department for p...
  • 313 篇 department of ph...
  • 306 篇 department of ph...
  • 301 篇 college of compu...
  • 300 篇 department of ph...
  • 299 篇 department of ph...
  • 276 篇 kirchhoff-instit...
  • 264 篇 yerevan physics ...
  • 252 篇 departamento de ...
  • 242 篇 fakultät für phy...
  • 241 篇 faculté des scie...
  • 231 篇 institute of phy...
  • 211 篇 department of ph...
  • 210 篇 institute of phy...

作者

  • 263 篇 c. alexa
  • 262 篇 j. m. izen
  • 254 篇 g. bella
  • 253 篇 j. strandberg
  • 253 篇 d. calvet
  • 253 篇 c. amelung
  • 243 篇 g. spigo
  • 242 篇 h. a. gordon
  • 241 篇 f. siegert
  • 230 篇 a. gomes
  • 229 篇 m. klein
  • 227 篇 y. tayalati
  • 227 篇 r. ströhmer
  • 218 篇 a. c. könig
  • 216 篇 m. rijssenbeek
  • 214 篇 s. jin
  • 211 篇 g. gaudio
  • 205 篇 d. guest
  • 203 篇 s. mohapatra
  • 202 篇 a. artamonov

语言

  • 18,091 篇 英文
  • 512 篇 其他
  • 121 篇 中文
  • 11 篇 德文
  • 4 篇 法文
  • 3 篇 日文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Theoretical Computer Science"
18716 条 记 录,以下是141-150 订阅
排序:
A Novel Approach Using Machine Learning for Accurate Detection of DDoS Attack in software Defined Network  2nd
A Novel Approach Using Machine Learning for Accurate Detecti...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Sharma, Hitesh Kumar Choudhury, Tanupriya Kotecha, Ketan Mahdi, Hussain Falih Dutta, Soumi Bhattacharya, Abhishek Sar, Ayan Energy Acres Bidholi Uttarakhand Bidholi India School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun India Pune India Pune India Department of Computer and Software Engineering University of Diyala Baquba Iraq Sister Nivedita University Chakpachuria India
A denial Of Service (DoS) attack is termed an attack when the request-receiving server or network shuts down or becomes inaccessible for service. This kind of attack is caused by flooding the target server or network ... 详细信息
来源: 评论
Decentralized Authentication Scheme Incorporating Reputation and Attribute Signature for Cross-Web3 Applications
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14526-14537页
作者: Song, Xiaoling Xu, Guangxia Huang, Yongfei Liu, Yong Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China Peng Cheng Laboratory Department of New Networks Shenzhen518000 China Chongqing University of Posts and Telecommunications School of Software Engineering Chongqing400065 China
Driven by Web 3.0, the number of decentralized applications (DAPPs) continues to increase, and the need for decentralized authentication across applications becomes more and more significant. In addition, multi-dimens... 详细信息
来源: 评论
Medical Image Classification with KAN-Integrated Transformers and Dilated Neighborhood Attention
arXiv
收藏 引用
arXiv 2025年
作者: Manzari, Omid Nejati Asgariandehkordi, Hojat Koleilat, Taha Xiao, Yiming Rivaz, Hassan Tehran Iran Department of Electrical and Computer Engineering Concordia University Montreal Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Convolutional networks, transformers, hybrid models, and Mamba-based architectures have demonstrated strong performance across various medical image classification tasks. However, these methods were primarily designed... 详细信息
来源: 评论
Tropical Cyclone Intensity Prediction Using Spatio-Temporal Data Fusion
收藏 引用
IEEE Access 2025年 13卷 70095-70104页
作者: Sattar, Kalim Muhammad Saad Missen, Malik Saher, Najia Nawaz Bashir, Rab Zoupash Zahra, Syeda Faheem, Muhammad Rehman Khan, Amjad Department of Information Technology Islamia University of Bahawalpur Bahawalpur63100 Pakistan Department of Software Engineering Islamia University of Bahawalpur Bahawalpur63100 Pakistan Department of Artificial Intelligence Islamia University of Bahawalpur Bahawalpur63100 Pakistan COMSATS University Islamabad Department of Computer Science Vehari Campus Vehari61100 Pakistan Riyadh12435 Saudi Arabia VTT Technical Research Centre of Finland Espoo02150 Finland
Tropical cyclone is a sea storm that causes important life and economic losses in the coastal regions in the tropical zone around the equator of the earth. Tropical cyclone intensity is an important characteristic use... 详细信息
来源: 评论
Breaking the Vault: A Case Study of the 2022 LastPass Data Breach
arXiv
收藏 引用
arXiv 2025年
作者: Gentles, Jessica Fields, Mason Goodman, Garrett Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
Managing the security of employee work computers has become increasingly important as today’s work model shifts to remote and hybrid work plans. In this paper, we explore the recent 2022 LastPass data breach, in whic... 详细信息
来源: 评论
The 23andMe Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies
arXiv
收藏 引用
arXiv 2025年
作者: Holthouse, Ryan Owens, Serena Bhunia, Suman Department of Computer Science and Software Engineering Miami University OxfordOH45056 United States
In October 2023, 23andMe, a prominent provider of personal genetic testing, ancestry, and health information services, suffered a significant data breach orchestrated by a cybercriminal known as "Golem." Ini... 详细信息
来源: 评论
Monitoring of Fire-Affected Buildings and Air-Quality Assessment: A Remote-Sensing Study Using Ground-Based interferometric Radar and Google-Earth-Engine
收藏 引用
Rangeland Ecology and Management 2025年 101卷 28-42页
作者: Zhang, Hao Zheng, Xiangtian Ghaffar, Bushra Quddoos, Abdul Naz, Iram Aslam, Rana Waqar Fatima, Zoia Abdullah-Al-Wadud, M. Zulqarnain, Rana Muhammad China Academy of Safety Science and Technology Beijing 100012 China Nanjing Institute of Technology School of Computer Engineering Nanjing 211167 China Department of Environmental Science Faculty of Sciences International Islamic University Islamabad 44000 Pakistan State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing (LIESMARS) Wuhan University Wuhan 430079 China Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh 11543 Saudi Arabia Department of Mathematics Saveetha School of Engineering SIMATS Thandalam Tamilnadu Chennai - 602105 India
This study investigates the environmental and structural impacts of crop and rangeland residue burning in Punjab during April and May 2023, utilizing ground-based interferometric radar alongside atmospheric and land u... 详细信息
来源: 评论
Adaptive Deep Reinforcement Learning-based Resource Management for Complex Decision Making in Industry Internet of Things Applications  4
Adaptive Deep Reinforcement Learning-based Resource Manageme...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Karne, Niharika Ramagundam, Chandra Shekar Patnala, Ranga Rao Ramagundam, Shashishekhar Tadiboina, Sai Nitisha Sr. Principal Systems Engineer in C&RS Platform Services University of South Alabama Department of Electrical Engineering Masters in Electrical Engineering Amtrak DT United States Software Engineer in Cloud Platform Services City of Philadelphia Pennsylvania United States Vice President Neuberger Berman United States Software Development & Engineering in Content Discovery & AI Troy University Department of Computer Science Masters in Computer Science AL Comcast Montgomery Campus United States Department of Information Technology GEICO - Chevy Chase Chevy ChaseMD20815 United States
An independent industrial system may transform into a connected network through the assistance of Industrial Internet of Things (IIoT). The deployed sensors in the IIoT maintain surveillance of the industrial machiner... 详细信息
来源: 评论
A Joint Secure Mechanism of Multi-task Learning For A UAV Team Under FDI Attacks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zeng, Rongfei Jiang, Chenyang Wang, Xingwei Li, Baochun Northeastern University Software College Shenyang China AliCloud Hangzhou China Northeastern University Department of Computer Science and Engineering Shenyang China University of Toronto Department of Electrical and Computer Engineering Canada
A UAV team shows tremendous potential for various mobile scenarios. However, some evidences reveal their vulnerability to False Data Injection (FDI) attacks, which can significantly jeopardize the flight security or e... 详细信息
来源: 评论
Opportunistic Routing in Drone-Augmented Mobile Social Networks
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Takenaka, Katsuyuki Sakai, Kazuya Chiang, Ivan Brian Sun, Min-Te Ku, Wei-Shinn Tokyo Metropolitan University Department of Electrical Engineering and Computer Science 6-6 Asahigaoka Hino Tokyo191-0065 Japan National Central University Department of Computer Science and Information Engineering Taoyuan320 Taiwan Auburn Universiry Department of Computer Science and Software Engineering AuburnAL36849 United States
Mobile social network (MSN) technologies are producing viable solutions to many critical scenarios, including disaster recovery, mobile crowdsourcing, mobile file caching, mobile agent systems, and so on. MSN performa... 详细信息
来源: 评论