咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 543 篇 英文
  • 21 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是181-190 订阅
排序:
Using the recurrence plots as indicators for the recognition of Parkinson’s disease through phonemes assessment
Using the recurrence plots as indicators for the recognition...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Vasileios Skaramagkas Anastasia Pentari Dimitrios I. Fotiadis Manolis Tsiknakis Dept. of Electrical and Computer Engineering Hellenic Mediterranean University Heraklion Crete Greece Institute of Computer Science Foundation for Research and Technology Hellas (FORTH) Heraklion Crete Greece Dept. of Biomedical Research Institute of Molecular Biology and Biotechnology (FORTH) Ioannina Greece Dept. of Materials Science and Engineering Unit of Medical Technology and Intelligent Information Systems University of Ioannina Ioannina Greece
Parkinson’s disease (PD) is considered to be the second most common neurodegenerative disease which affects the patients’ life throughout the years. As a consequence, its early diagnosis is of major importance for t...
来源: 评论
A CNN Based Approach to Classify the Folk Dances of Odisha
A CNN Based Approach to Classify the Folk Dances of Odisha
收藏 引用
2022 IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2022
作者: Samantaray, Swati Patra, Sudhansu Shekhar Mohanty, Amlan Barik, Lalbihari Barik, Akash Brahma, Aditya Narayan Kiit Deemed to Be University School of Humanities Bhubaneswar India Kiit Deemed to Be University School of Computer Applications Bhubaneswar India Iiit Department of Computer Science Bhubaneswar India King Abdulaziz University Faculty of Computing & Information Technology in Rabigh Department of Information Systems Saudi Arabia New Horizon College of Engineering Dept. of Computer Science Bengaluru India
Folk dances are a primordial expression of ecstasy and bliss and serve as a mode of communication. They also facilitate in keeping the people connected to their traditions as well as ancestry. Furthermore, these dance... 详细信息
来源: 评论
Comparing SWIPT Techniques for Zero-Energy RIS
Comparing SWIPT Techniques for Zero-Energy RIS
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Dimitrios Tyrovolas Vasilis K. Papanikolaou Sotiris A. Tegos Yue Xiao Panagiotis D. Diamantoulakis Sotiris Ioannidis Christos Liaskos George K. Karagiannidis Dept. of Electrical and Computer Engineering Aristotle University of Thessaloniki Thessaloniki Greece Dept. of Electrical and Computer Engineering Technical University of Chania Chania Greece School of Information Science and Technology Southwest Jiaotong University Chengdu China Computer Science Engineering Department University of Ioannina Ioannina and Foundation for Research and Technology Hellas (FORTH) Greece Cyber Security Systems and Applied AI Research Center Lebanese American University (LAU) Lebanon
Providing enhanced quality of service (QoS) to support demanding applications in the most energy-efficient way has been identified as a primary objective of future 6G networks. Towards this direction, the concept of p...
来源: 评论
Impact of Dataset Balancing on Machine Learning-Based Intrusion Detection systems
Impact of Dataset Balancing on Machine Learning-Based Intrus...
收藏 引用
IEEE International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA)
作者: Muhammad Iqbal Yusri Mohamed Hadi Habaebi Teddy Surya Gunawan Hasmah Mansor Mira Kartiwi Levy Olivia Nur Electrical and Computer Engineering Dept. International Islamic University Malaysia Kuala Lumpur Malaysia Information Systems Department International Islamic University Malaysia Kuala Lumpur Malaysia School of Electrical Engineering Telkom University Bandung Indonesia
Intrusion Detection systems (IDS) are indispensable for cybersecurity, as they safeguard networks from increasingly sophisticated and sophisticated cyberattacks. This paper assesses the influence of dataset balancing ... 详细信息
来源: 评论
Advanced Machine Learning Techniques for Enhancing Data security in Cloud Computing systems
Advanced Machine Learning Techniques for Enhancing Data Secu...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: M Dhinakaran M Sundhari S. Ambika V. Balaji R.Thalapathi Rajasekaran Department of Electronics and Communication Engineering Galgotias College of Engineering & Technology Greater Noida Uttar Pradesh India Dept. of Computer Science and Engineering GRT Institute of Engineering and Technology Tiruttani Tamil Nadu India Department of Information Technology E. G. S. Pillay Engineering College Nagapattinam Tamil Nadu India Department of CSE (Cyber Security) Easwari Engineering College Chennai India Dept. of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India
In the age of cloud computing, data stored and processed in the cloud must be secure. This study examines how powerful machine learning can secure cloud computing data. Three trials assessed different machine learning...
来源: 评论
Trusted Access to 6G Testbeds Through a security Intent-Driven Software-Defined Perimeter Framework
Trusted Access to 6G Testbeds Through a Security Intent-Driv...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and networks, CAMAD
作者: Carolina Fernández-Martínez Anastasios Bikos Christos Verikoukis Shuaib Siddiqui i2CAT Foundation Barcelona Spain Dept. of Information and Communication Technologies Universitat Pompeu Fabra Barcelona Spain Iquadrat Informatica SL Barcelona Spain Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya Barcelona Spain Industrial Systems Institute / Athena Research Center Patras Greece Dept. of Computer Engineering and Informatics University of Patras Patras Greece
Parallel to the evolution of recent trends in the cybersecurity industry and the increase of cyberattacks in the last few years, there is renovated interest on the application of software-defined techniques to enforce... 详细信息
来源: 评论
Effective DGA Family Classification Using a Hybrid Shallow and Deep Packet Inspection Technique on P4 Programmable Switches
Effective DGA Family Classification Using a Hybrid Shallow a...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ali AlSabeh Kurt Friday Jorge Crichigno Elias Bou-Harb College of Engineering and Computing University of South Carolina (USC) Columbia South Carolina USA Information Systems and Cyber Security Dept. The Cyber Center For Security and Analytics University of Texas at San Antonio (UTSA) San Antonio Texas USA
Domain Generation Algorithms (DGAs) are one of the most effective strategies for malware to obtain a connection with the adversary's Command and Control (C2) server. Moreover, the growing number of DGA families ma...
来源: 评论
WP-CamemBERT for next location Prediction
WP-CamemBERT for next location Prediction
收藏 引用
iNnovative Informatics of Biskra (ISNIB), International Symposium on
作者: Salah Eddine Henouda Fatima Zohra Laallam Okba Kazar Abdessamed Sassi Houssam Eddine Aouarib Djihane Houfani Dept. Computer Science (LINATI Laboratory) LINFI laboratory of Biskra Kasdi Merbah University Ouargla ALGERIA Dept. Computer Science LINATI Laboratory Kasdi Merbah University Ouargla ALGERIA Dept. Information Systems and Security College of Information Technology United Arab Emirate University UAE Dept. Computer Science Oum El Bouaghi University Oum El Bouaghi ALGERIA Dept. Computer science LINFI Laboratory Mohamed Khider University Biskra ALGERIA
CamemBERT is a Natural Language Processing (NLP) model. The current paper introduced a combination of Bertwordpiece tokenizer and CamemBERT that we named WP-CamemBERT, to solve the next location prediction problem. Su... 详细信息
来源: 评论
In-dept. review of integration of AI in cloud computing  3
In-depth review of integration of AI in cloud computing
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Mohamed, Nachaat Sridhara Rao, L. Sharma, Manju Sureshbaburajasekaranl Badriasulaimanalfurhood Kumar Shukla, Surendra Universiti Sains Malaysia Rabdan Academy UAE Homeland Security Abu Dhabi United Arab Emirates J.B. Institute of Engineering and Technology Dept. of Information Technology Hyderabad India Lecturer Jazan University Jazan Saudi Arabia NVIDIA Corporation Group Product Manager United States College of Computer and Information Sciences Princess Nourahbint Abdulrahman University Department of Computer Sciences Saudi Arabia Graphic Era Deemed to Be University Department of CSE Uttarakhand Dehradun India
The successful distribution of computer services, including software, storage needs, analytics, intelligence, and many others, is reflected in cloud computing. Additionally, it provides quicker innovation while simult... 详细信息
来源: 评论
Authentic Learning on DevOps security with Labware: Git Hooks To Facilitate Automated security Static Analysis
Authentic Learning on DevOps Security with Labware: Git Hook...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Md Mostafizur Rahman MD Abdul Barek Mst Shapna Akter Abm Kamrul Islam Riad Md Abdur Rahman Hossain Shahriar Akond Rahman Fan Wu Department of Information Technology University of West Florida Florida USA Department of Intelligent Systems and Robotics University of West Florida Florida USA Center for Cyber Security University of West Florida Florida USA Dept. of Computer Science and Software Engineering Auburn University USA Tuskegee University Alabama USA
This paper presents an innovative approach to DevOps security education, addressing the dynamic landscape of cybersecurity threats. We propose a student-centered learning methodology by developing comprehensive hands-... 详细信息
来源: 评论