咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是391-400 订阅
排序:
Resolving Braess's paradox in random networks
Resolving Braess's paradox in random networks
收藏 引用
9th International Conference on Web and Internet Economics, WINE 2013
作者: Fotakis, Dimitris Kaporis, Alexis C. Lianeas, Thanasis Spirakis, Paul G. Electrical and Computer Engineering National Technical University of Athens Greece Information and Communication Systems Dept. University of the Aegean Samos Greece Department of Computer Science University of Liverpool United Kingdom Computer Technology Institute and Press - Diophantus Patras Greece
Braess's paradox states that removing a part of a network may improve the players' latency at equilibrium. In this work, we study the approximability of the best subnetwork problem for the class of random Gn,p... 详细信息
来源: 评论
A privacy-preserving entropy-driven framework for tracing DoS attacks in VoIP
A privacy-preserving entropy-driven framework for tracing Do...
收藏 引用
2013 8th International Conference on Availability, Reliability and security, ARES 2013
作者: Tsiatsikas, Zisis Geneiatakis, Dimitris Kambourakis, Georgios Keromytis, Angelos D. Dept. of Inform. and Comm. Systems Engineering University of the Aegean Karlovassi Greece Institute of the Protection and Security Citizen Joint Research Center Ispra Italy Department of Computer Science Columbia University New York United States
network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volu... 详细信息
来源: 评论
Online Activity Traces Around a "Boston Bomber"
Online Activity Traces Around a "Boston Bomber"
收藏 引用
International Conference on Advances in Social networks Analysis and Mining
作者: Alexander Semenov Alexander Nikolaev Jari Veijalainen Dept. of Computer Science and Information Systems The University of Jyv?skyl? Jyv?skyl? Finland Dept. of Industrial and Systems Engineering The University at Buffalo SUNY Buffalo USA
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic ... 详细信息
来源: 评论
Base station location optimisation in LTE using Genetic Algorithm
Base station location optimisation in LTE using Genetic Algo...
收藏 引用
International Conference on information and Communication Technology Convergence (ICTC)
作者: Aida Al-Samawi Aduwati Sali Nor Kamariah Noordin Mohamed Othman Fazirulhisyam Hashim Dept. of Computer & Communication Systems Engineering UPM Selangor Malaysia Department of Communication Technology and Network UPM Selangor Malaysia
Long Term Evolution (LTE) is a promising technology for mobile communication. This technology is based on reducing the base stations cell size, which will lead to an increment in the number of base stations. As a resu... 详细信息
来源: 评论
Building a Self-Organizing Phishing Model Based upon Dynamic EMCUD
Building a Self-Organizing Phishing Model Based upon Dynamic...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Shian-Shyong Tseng Ching-Heng Ku Ai-Chin Lu Yuh-Jye Wang Guang-Gang Geng Dept. of Applied Informatics and Multimedia Asia University Taichung Taiwan Taiwan Network Information Center Taipei Taiwan Dept. of Computer Science and Information Engineering Asia University Taichung Taiwan China Internet Network Information Center Chinese Academy of Sciences Beijing China
In recent years, with the rapid growth of the Internet applications and services, phishing attacks seriously threaten the web security. Due to the versatile and dynamic nature of phishing patterns, the development and... 详细信息
来源: 评论
Power-Efficient Resource Allocation for QoS Provisioning in Underwater MIMO-OFDM Acoustic Cooperative Wireless networks
Power-Efficient Resource Allocation for QoS Provisioning in ...
收藏 引用
IEEE Global Communications Conference
作者: Ping Wang Xi Zhang Mei Song Networking and Information Systems Laboratory Dept. of Electrical and Computer Engineering Texas A&M University School of Electronic Engineering Beijing University of Posts and Telecommunications
In recent years, the multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the relay communication techniques have significantly improved the important performance of radio ... 详细信息
来源: 评论
A broadcast streaming method over ad hoc networks enabling high packet reachability and long battery lifetime
A broadcast streaming method over ad hoc networks enabling h...
收藏 引用
2012 9th Asia-Pacific Symposium on information and Telecommunication Technologies, APSITT 2012
作者: Utsu, Keisuke Sano, Hiroshi Nishikawa, Hiroaki Ishii, Hiroshi Dept. of Communication and Network Engineering Sch. of Information and Telecommunication Engineering Tokai University Tokyo Japan Dept. of Computer Science Graduate School of Systems and Information Engineering University of Tsukuba Ibaraki Japan
This paper considers cases where a specific number of nodes in an ad hoc network broadcast video and audio streams over the entire network. For the purpose, we have proposed Load and Battery Charge oriented Flooding (... 详细信息
来源: 评论
User-centric, privacy-preserving adaptation for voIP CAPTCHA challenges  6
User-centric, privacy-preserving adaptation for voIP CAPTCHA...
收藏 引用
6th International Symposium on Human Aspects of information security and Assurance, HAISA 2012
作者: Tasidou, A. Efraimidis, P.S. Soupionis, Y. Mitrou, L. Katos, V. Democritus University of Thrace Dept. of Electrical and Computer Engineering Greece Greece University of the Aegean Dept. of Information and Communication Systems Engineering Greece
The effectiveness of CAPTCHA challenges largely depends on being simultaneously easier to solve for humans and harder to solve for bots. In this work we argue that it is possible to enhance the effectiveness of audio ... 详细信息
来源: 评论
A cross-layer security framework for wireless mesh networks  1
收藏 引用
2011 International Conference on Future Wireless networks and information systems, ICFWI 2011
作者: Wei, Chuyuan Li, Yongzhen Lv, Cheng Dept. of Computer Teaching and Network Information Beijing Institute of Civil Engineering and Architecture Beijing China
Wireless mesh networks is a new type of broadband access network. It has very typical network architecture of hybrid mesh network architecture. As wireless mesh network with distributed network architecture, it is rel... 详细信息
来源: 评论
Application of SS-MVPN technology in mobile network
Application of SS-MVPN technology in mobile network
收藏 引用
2012 International Conference on Electrical Insulating Materials and Electrical engineering, EIMEE 2012
作者: Hang, Qiangwei Chen, Bing Hou, Qiang Key Laboratory of Information Network Security Ministry of Public Securitythe 3rd research institute of ministry of public security Shanghai China Dept. of computer engineering of Tongji University Shanghai China
More and more people are using mobile equipments to access business resources from the organization's internal network, how to ensure the data security in the data transport process of mobile intelligent terminals... 详细信息
来源: 评论