咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是401-410 订阅
排序:
To crash or not to crash: Estimating its likelihood and potentials of beacon-based IVC systems
To crash or not to crash: Estimating its likelihood and pote...
收藏 引用
2012 IEEE Vehicular networking Conference, VNC 2012
作者: Joerer, Stefan Segata, Michele Bloessl, Bastian Cigno, Renato Lo Sommer, Christoph Dressler, Falko Computer and Communication Systems Institute of Computer Science University of Innsbruck Austria Systems and Networks Dept. of Information Engineering and Computer Science University of Trento Italy
Is it possible to estimate some 'safety' metric to assess the effectiveness of Intelligent Transportation systems? In particular, we are interested in using Inter-Vehicle Communication (IVC) beaconing for incr... 详细信息
来源: 评论
Recognizing pornographic images  12
Recognizing pornographic images
收藏 引用
14th ACM Multimedia and security Workshop, MM and Sec 2012
作者: Karavarsamis, Sotiris Pitas, Ioannis Ntarmos, Nikos Artificial Intelligence and Information Analysis Lab. Department of Informatics Aristotle University Thessaloniki Greece Network-Centric Information Systems Lab. Computer Engineering and Informatics Dept. University of Patras Greece
We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions i... 详细信息
来源: 评论
A novel search system for protecting search word
A novel search system for protecting search word
收藏 引用
6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012
作者: Lee, Kyungroul Cho, Eun-Ae Yim, Kangbin Dept. of Information Security Engineering Soonchunhyang University 646 Eupnae Shinchang Asan Korea Republic of Dept. of Computer Science Purdue University 305 N. University Street West Lafayette IN United States
The rate of growth to share diverse information between users is increasing in the market of current search engine systems. However, in spite of this development, a user inputted search word is not protected, and when... 详细信息
来源: 评论
Distance Hijacking Attacks on Distance Bounding Protocols - Abstract  19
Distance Hijacking Attacks on Distance Bounding Protocols - ...
收藏 引用
19th Annual network and Distributed System security Symposium, NDSS 2012
作者: Cremers, Cas Rasmussen, Kasper B. Čapkun, Srdjan ETH Zurich Information Security group Zurich Switzerland University of California Irvine Computer Science Dept. IrvineCA United States ETH Zurich Systems Security Group Zurich Switzerland
来源: 评论
Cyber-physical systems as an enabler for next generation applications
Cyber-physical systems as an enabler for next generation app...
收藏 引用
2012 15th International Conference on network-Based information systems, NBIS 2012
作者: Singh, Jaipal Hussain, Omar Dept. of Electrical and Computer Engineering Curtin University Perth WA Australia School of Information Systems Curtin University Perth WA Australia
Cyber-Physical systems (CPS) has been identified as a key technology for providing next generation applications for improving transportation, electricity delivery & usage, and healthcare in the 21st century. This ... 详细信息
来源: 评论
Computing dynamically equivalent realizations of biochemical reaction networks with mass conservation
收藏 引用
AIP Conference Proceedings 2013年 第1期1558卷 2356-2359页
作者: János Rudan Gábor Szederkényi Katalin M. Hangos Faculty of Information Technology Pázmány Péter Catholic University Práter u. 50/a H-1083 Budapest Hungary Faculty of Information Technology Pázmány Péter Catholic University Práter u. 50/a H-1083 Budapest Hungary and Process Control Research Group Computer and Automation Research Institute Hungarian Academy of Sciences. Hungary Process Control Research Group Computer and Automation Research Institute Hungarian Academy of Sciences. Kende u. 13-17 H-1111 Budapest Hungary and Dept. of Electrical Engineering and Information Systems Faculty of Information Technology Univer Hungary
An algorithm for the computation of mass conservative dynamically equivalent chemical reaction network structures is proposed in this paper. The algorithm is formulated in an optimization-based framework as a mixed-in...
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
Construction and evaluation of it security domain-specific vocabulary
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第18期4卷 341-349页
作者: Qian, Liping Wang, Lidong School of Information Renmin University of China Beijing China Dept. Of Computer Science Beijing University of Civil Engineering and Architecture China National Institute of Network and Information Security CNCERT/CC China
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have b... 详细信息
来源: 评论
Enabling data protection through PKI encryption in IoT m-Health devices
Enabling data protection through PKI encryption in IoT m-Hea...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Charalampos Doukas Ilias Maglogiannis Vassiliki Koufi Flora Malamateniou George Vassilacopoulos Dept. of Information and Communication Systems Engineering University of Aegean Dept. of Computer Science and Biomedical Informatics University of Central Greece Dept. of Digital Systems University of Piraeus Greece
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-... 详细信息
来源: 评论
RFID-based electronic identity security cloud platform in cyberspace
收藏 引用
Journal of networks 2012年 第7期7卷 1131-1138页
作者: Chen, Bing Tan, Chengxiang Jin, Bo Zou, Xiang Dai, Yuebo The 3rd research institute of ministry of public security Shanghai China Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer science and engineering Tongji University Shanghai China
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated w... 详细信息
来源: 评论