咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 543 篇 英文
  • 21 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是251-260 订阅
排序:
An Efficient Localization for Indoor Environment using Classification Algorithms
An Efficient Localization for Indoor Environment using Class...
收藏 引用
2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
作者: Mulahuwaish, Aos Towne, Wyatt Ghafoor, Kayhan Zrar Maghdid, Halgurd S. Saginaw Valley State University Dept. of Computer Science and Information Systems Michigan United States Salahaddin University-Erbil Dep. of Software Engineering and Informatics Iraq Koya University Faculty of Engineering Dept. of Software Engineering Kurdistan Region-F.R. Iraq
The positioning accuracy of various kinds of devices is often calculated by using Wi-Fi fingerprints as a data source of Received Signal Strength (RSS). Through different matching algorithms, these RSS values are rela... 详细信息
来源: 评论
Secure Data Exchange in the Industrial Internet of Things network of the Fuel and Energy Complex
Secure Data Exchange in the Industrial Internet of Things Ne...
收藏 引用
2020 International Conference on Electrotechnical Complexes and systems, ICOECS 2020
作者: Emil, Hajrullin Vulfin, Alexey Mironov, Konstantin Frid, Arkadij Guzairov, Murat Kirillova, Anastasia Ufa State Aviation Technical University Dept. of Computer Engineering and Information Security Ufa Russia Ufa State Aviation Technical University Inmt Ural Federal University Ufa Russia
The issues of data exchange security increasing in the Industrial Internet of Things network of the fuel and energy complex enterprises based on the use of the domestic cryptographic protocol CRISP 1.0 are considered.... 详细信息
来源: 评论
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency  20
Automatic Seed Generation based Hybrid Fuzzing for Code Cove...
收藏 引用
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications
作者: Soonhong Kwon Yangseo Choi Jong-Hyouk Lee Dept. of Computer and Information Security & Covergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea Electronics and Telecommunication Research Institute Daejeon Republic of Korea
Based on the 4th Industrial Revolution, numerous ICT technologies are developing, and for this reason, IoT devices are formed around us. Accordingly, hackers are inflicting financial and physical damage to our lives b... 详细信息
来源: 评论
Efficient Context-aware File System Approach  7
Efficient Context-aware File System Approach
收藏 引用
7th International Conference on Software Defined systems, SDS 2020
作者: Razaque, Abdul Amsaad, Fathi Almiani, Muder Xiaoya, Wan Shiyu, Li Ganda, Raouf Rawashdeh, Majdi Alrahayfeh, Amer Dept. of Computer Engineering and Telecommunication Eastern Michigan University School of Information Security United States Al-Hussein Bin Talal University College of Information Technology Jordan Dept. of Computer Science NYIT Nanjing China Yale School of Management Yale University United States Princess Sumaya University for Technology Department of Business Information Technology Amman Jordan
With the rapid development of science and technology, wireless networks are now widely used throughout the world. Given the requirement to improve the usability of computers, a context-aware file system has been rende... 详细信息
来源: 评论
Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research
arXiv
收藏 引用
arXiv 2022年
作者: Bavdekar, Ritik Chopde, Eashan Jayant Bhatia, Ashutosh Tiwari, Kamlesh Daniel, Sandeep Joshua Atul Dept. of Computer Science and Information Systems Birla Insitute of Technology and Science Pilani Pilani Campus Jhunjhunu Rajasthan 333031 India Department of Electrical and Electronics Engineering Birla Insitute of Technology and Science Pilani Pilani Campus Jhunjhunu Rajasthan 333031 India
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover’s search algorithm g... 详细信息
来源: 评论
A Survey on Explainable Artificial Intelligence for Cybersecurity
arXiv
收藏 引用
arXiv 2023年
作者: Rjoub, Gaith Bentahar, Jamal Wahab, Omar Abdel Mizouni, Rabeb Song, Alyssa Cohen, Robin Otrok, Hadi Mourad, Azzam King Hussein School of Computing Sciences Princess Sumaya University for Technology Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Electrical Engineering and Computer Science Department Khalifa University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates David R. Cheriton School of Computer Science University of Waterloo Canada Cyber Security Systems and Applied AI Research Center Dept. of CSM Lebanese American University Lebanon Division of Science New York University Abu Dhabi United Arab Emirates
The "black-box" nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing resea... 详细信息
来源: 评论
Distributed Trust Management for Secured Localization systems in Mobile Cloud Services
Distributed Trust Management for Secured Localization System...
收藏 引用
IEEE International Conference on Utility and Cloud Computing (UCC)
作者: Farouq Aliyu Mustafa Ghaleb Saud Mohammad Mostafa Sani Umar AbdalRahman Aburakhia Center of Excellence in Dev of NPO King Fahd University of Petr. & Min. Dhahran Saudi Arabia IRC for Intelligent Secure Systems King Fahd University of Petr. & Min. Dhahran Saudi Arabia Computer Engineering Department King Fahd University of Petr. & Min. Dhahran Saudi Arabia Dept. of Electrical Engr. and Computer Sci. Khalifa University Abu Dhabi UAE Information & Computer Science King Fahd University of Petr. & Min. Dhahran Saudi Arabia
The market for the Internet of Things (IoT) is expanding at an exponential rate. As IoT devices increasingly rely on cloud computing for data processing, storage, and management, the security of cloud-based IoT servic... 详细信息
来源: 评论
A new smart-cropping pipeline for prostate segmentation using deep learning networks
arXiv
收藏 引用
arXiv 2021年
作者: Zaridis, Dimitrios G. Mylona, Eugenia Tachos, Nikolaos S. Marias, Kostas Papanikolaou, Nikolaos Tsiknakis, Manolis Fotiadis, Dimitrios I. The Dept. of Biomedical Research FORTH-IMBB Ioannina Greece The Unit of Medical Technology and Intelligent Information Systems Dept. of Materials Science and Engineering University of Ioannina IoanninaGR 45110 Greece The Institute of Computer Science FORTH Heraklion Greece The Dept. of Electrical and Computer Engineering Hellenic Mediterranean University Greece The Centre for the Unknown Champalimaud Foundation Clinical Computational Imaging Group Lisbon Portugal Crete Heraklion Greece The Dept. of Biomedical Research Institute of Molecular Biology and Biotechnology FORTH Ioannina Greece The Dept. of Materials Science and Engineering Unit of Medical Technology and Intelligent Information Systems University of Ioannina IoanninaGR 45110 Greece
Prostate segmentation from magnetic resonance imaging (MRI) is a challenging task. In recent years, several network architectures have been proposed to automate this process and alleviate the burden of manual annotati... 详细信息
来源: 评论
Unsupervised Machine Learning for Malicious network Activities
Unsupervised Machine Learning for Malicious Network Activiti...
收藏 引用
2019 International Conference on Applied and engineering Mathematics, ICAEM 2019
作者: Hassan, Aamina Tahir, Shahzaib Baig, Ahmed Iftikhar Dept. of Information Security College of Signals National University of Sciences and Technology Islamabad Pakistan Dept. of Information Security Institue of Systems Engineering Riphah International University Islamabad Pakistan
Increase in cybercrimes in the last few years has dramatically increased the need for the network intrusion detection and subsequently its mitigation. Several classified intrusion detection systems (IDS) are currently... 详细信息
来源: 评论
The concept of integrity of telemetric information about the state of an aircraft power plant monitoring
The concept of integrity of telemetric information about the...
收藏 引用
2019 International Conference on Electrotechnical Complexes and systems, ICOECS 2019
作者: Guzairov, Murat Frid, Arkadij Vulfin, Alexey Berkholts, Victoria Ufa State Aviation Technical University Dept. of Computer Engineering and Information Security Ufa Russia
The issues of creating a system for monitoring the integrity of the accumulated data in a modular system for collecting, storing and processing telemetric information about the state of an aircraft's power plant b... 详细信息
来源: 评论