咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是421-430 订阅
排序:
Scalable wireless network security for bluetooth in global collaborative environment
Scalable wireless network security for bluetooth in global c...
收藏 引用
IEEE International Conference on Ubi-media Computing
作者: Seo, Dae Hee An, Gaeil Kim, Jonghyun Baek, Jang Mi Knowledge-based Information Security and Safety Research Dept. Electronics and Telecommunications Research Institute Choongrmm Korea Republic of Dept. Computer Software Engineering SoonChunHyang University DaeJeon Korea Republic of
Ubiquitous revolution is widely implemented around the world, innovative changes in mobile information environment provides high quality to meet many different users' demanding requirements. In particular, as comp... 详细信息
来源: 评论
Low-cost mitigation of privacy loss due to radiometric identification
Low-cost mitigation of privacy loss due to radiometric ident...
收藏 引用
17th Annual International Conference on Mobile Computing and networking, MobiCom'11 and Co-Located Workshops - 8th ACM International Workshop on Vehicular Inter-networking, VANET'11
作者: Haas, Jason J. Hu, Yih-Chun Laurenti, Nicola Computer Systems and Technologies Business Area Sandia National Laboratories Albuquerque NM United States Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign 1406 West Green Street Urbana IL United States Dept. of Information Engineering University of Padova Padova Italy
Recently, there has been much interest in using radiometric identification (also known as wireless fingerprinting) for the purposes of authentication. Previous work has shown that using radiometric identification can ... 详细信息
来源: 评论
Process-in-network for image providing services
Process-in-network for image providing services
收藏 引用
6th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC-2011
作者: Urzaiz, G. Villa, D. Villanueva, F.J. Barba, J. Santofimia, M.J. Moya, F. Lopez, J.C. Division of Engineering and Exact Sciences Anahuac Mayab University Mexico Dept. of Technology and Information Systems School of Computer Science University of Castilla-La Mancha Spain
Most image processing techniques are based on the idea that the information is processed in end nodes. Our proposal is based on a slightly different idea called Process-in-network (PIN) defined as the possibility that... 详细信息
来源: 评论
Simplified Expression of the Average Rate of Cellular networks Using Stochastic Geometry
Simplified Expression of the Average Rate of Cellular Networ...
收藏 引用
IEEE International Conference on Communications
作者: Alessandro Guidotti Marco Di Renzo Giovanni E. Corazza Fortunato Santucci University of Bologna Dept. of Electronics Computer Engineering and Systems (DEIS) L2S UMR 8506 CNRS - SUPELEC - Univ Paris-Sud Laboratory of Signals and Systems (L2S) French National Center for Scientific Research (CNRS) Ecole Superieure d'Electricite (SUPELEC) University of Paris-Sud XI (UPS) University of L'Aquila Dept. of Electrical and Information Engineering Center of Excellence DEWS
Accurate modeling of network interference, deep understanding of its impact on the achievable performance, and development of efficient techniques to mitigate or exploit it are three important and fundamental research... 详细信息
来源: 评论
A digraph model for risk identification and mangement in SCADA systems
A digraph model for risk identification and mangement in SCA...
收藏 引用
IEEE International Conference on Intelligence and security Informatics
作者: Guan, Jian Graham, James H. Hieb, Jeffrey L. Department of Computer Information Systems University of Louisville Louisville KY United States Dept.of Electrical and Computer Engineering University of Louisville Louisville KY United States Dept. of Engineering Fundamentals University of Louisville Louisville KY United States
Supervisory control and data acquisition (SCADA) systems are critical to today's industrial facilities and infrastructures. SCADA systems have evolved into large and complex networks of information systems and are... 详细信息
来源: 评论
Power analysis attack and countermeasure on the rabbit stream cipher
Power analysis attack and countermeasure on the rabbit strea...
收藏 引用
7th International Workshop on Software engineering for Secure systems, SESS 2011, Co-located with ICSE 2011
作者: Bae, Ki Seok Ahn, Mahn Ki Lee, Hoon Jae Ha, Jae Cheol Moon, Sang Jae Graduate School of EECS Kyungpook National University Daegu 702-710 Korea Republic of Defense Agency for Technology and Quality Seoul 130-050 Korea Republic of Dept. of Computer Information Engineering Dongseo University Pusan 617-716 Korea Republic of Dept. of Information Security Hoseo University Asan 336-795 Korea Republic of
Recently, there has been extensive research on mobile devices and stream cipher to increase security. The Rabbit stream cipher was selected for the final eSTREAM portfolio organized by EU ECRYPT and as one of algorith... 详细信息
来源: 评论
Intelligent Education Services Based on Context Mediator in Pervasive Computing
Intelligent Education Services Based on Context Mediator in ...
收藏 引用
The 2011 International Conference on Business, Economics, and Financial Sciences, Management (BEFM 2011)
作者: Taijong Kim Mincheol Kim Do Hyeun Kim Dept.of Management Information Systems Jeju National University Dept. of Computer Engineering Jeju National University
In the pervasive computing environment,humans and devices or machines with computing ability become *** order to implement intelligent services in this environment,hardware technologies such as sensing and security ar... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A digraph model for risk identification and mangement in SCADA systems
A digraph model for risk identification and mangement in SCA...
收藏 引用
IEEE International Conference on Intelligence and security Informatics, ISI
作者: Jian Guan James H. Graham Jeffrey L. Hieb Department of Computer Information Systems University of Louisville USA KY USA Department of Electrical and Computer Engineering University of Louisville Louisville KY USA Dept. of Electrical and Computer Engineering Louisville KY USA Dept. of Engineering Fundamentals University of Louisville Louisville KY USA
Supervisory control and data acquisition (SCADA) systems are critical to today's industrial facilities and infrastructures. SCADA systems have evolved into large and complex networks of information systems and are... 详细信息
来源: 评论
Privacy reference architecture for personal information life cycle
Privacy reference architecture for personal information life...
收藏 引用
3rd International Conference on Advanced Communication and networking, ACN 2011
作者: Shin, Yong-Nyuo Chun, Woo Bong Jung, Hong Soon Chun, Myung Geun Dept. of Computer Engineering Hanyang Cyber University 17 Haengdang-dong Seongdong-gu Seoul Korea Republic of Sungkyunkwan University 300 cheoncheon-dong Jangan-gu Suwon Gyeonggi-do Korea Republic of Korea Information Security Agency IT Venture Tower Jungdaero 135 Songpa-gu Seoul Korea Republic of Dept.of Electrical and Computer Engineering Chungbuk National University 410 Seongbong-ro Heungdeok-gu Cheongju chungbuk Korea Republic of
The increased commercial use (and value) of PII(Privacy Identifiable information), the sharing of PII across legal jurisdictions, and the growing complexity of ICT systems, makes it extremely difficult for an organiza... 详细信息
来源: 评论