咨询与建议

限定检索结果

文献类型

  • 477 篇 会议
  • 78 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 565 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 344 篇 工学
    • 277 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 109 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 38 篇 电气工程
    • 33 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 21 篇 交通运输工程
    • 20 篇 动力工程及工程热...
    • 18 篇 生物医学工程(可授...
    • 17 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
  • 140 篇 理学
    • 80 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 95 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 27 篇 法学
    • 19 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 13 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 11 篇 wireless sensor ...
  • 11 篇 feature extracti...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 6 篇 nikumani choudhu...
  • 6 篇 vulfin alexey
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 550 篇 英文
  • 12 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
565 条 记 录,以下是51-60 订阅
排序:
Aqua Safe: Blockchain Based Maritime Communication System using Ad hoc network  13
Aqua Safe: Blockchain Based Maritime Communication System us...
收藏 引用
13th International Conference on Computing Communication and networking Technologies, ICCCNT 2022
作者: Lokuliyana, Shashika Wellalage, Sasini Warusavithana, Lahiru Pathirana, Madusha Kodithuwakku, Sanjula Munasinghe, Thamali Sri Lanka Institute of Information Technology Dept. of Computer Systems Engineering Malabe Sri Lanka
The lack of a pre-existing infrastructure for facilitating long-range connectivity with the land makes maritime communications extremely difficult. Satellite connections, which are expensive, and use much power, are g... 详细信息
来源: 评论
USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education  1
USDOT Tier-1 University Transportation Center for Advancing ...
收藏 引用
1st IEEE International Conference on Mobility, Operations, Services and Technologies, MOST 2023
作者: Zhang, Yunpeng Jack Wang, Kailai Song, Lingguang Lendasse, Amaury Song, Houbing Herbert Han, Zhu Verma, Rakesh Silva, Arlei Rubio-Medrano, Carlos Li, Zhixia Richard Zhang, Guohui University of Houston Dept. of Information Science Technology HoustonTX United States University of Houston Dept. of Construction Management HoustonTX United States University of Maryland Baltimore County Dept. of Information Systems BaltimoreMD United States University of Houston Dept. of Electrical & Computer Engineering HoustonTX United States University of Houston Dept. of Computer Science HoustonTX United States Rice University Dept. of Computer Science HoustonTX United States Texas A&m University-Corpus Christi Dept. of Computer Science Corpus ChristiTX United States University of Cincinnati Dept. of Civil and Architectural Engineering and Construction Management CincinnatiOH United States University of Hawai'i at Mānoa Dept. Civil and Environmental Engineering HonoluluHI United States
The Transportation Cybersecurity Center for Advanced Research and Education (CYBER-CARE) is a US Department of Transportation (USDOT) Tier-1 University Transportation Center (UTC) funded in 2023. CYBER-CARE primarily ... 详细信息
来源: 评论
Holistic understanding of digital transformation of health care system as a point-of-departure for system requirements specification
Holistic understanding of digital transformation of health c...
收藏 引用
2024 Ongoing Research, Practitioners, Posters, Workshops, and Projects of the International Conference EGOV-CeDEM-ePart, EGOV-CeDEM-ePart-Ongoing 2024
作者: Karunaratne, Thashmee Ayele, Workneh Larsson, Aron Assom, Luigi Züniga, Gisele Dept. of Computer and Systems Sciences Stockholm University Kista 164 40 Sweden School of Industrial Engineering and Management Royal Institute of Technology/KTH Stockholm100 44 Sweden Dept. of Communication Quality Management and Information Systems Mid Sweden University Sundsvall851 70 Sweden Actadig Stockholm Sweden
The challenges regarding harmonised interoperable e-health services are enormous due to the complexity of the domain, comparatively high demands of privacy and security, implications of storing, sharing, and managing ... 详细信息
来源: 评论
Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards
收藏 引用
International Cybersecurity Law Review 2024年 第1期5卷 79-120页
作者: Gounari, Marianna Stergiopoulos, George Pipyros, Kosmas Gritzalis, Dimitris Dept. of Information & Communication Systems Engineering University of the Aegean Samos Greece Dept. of Computer Science Philips University Nicosia Cyprus Dept. of Informatics Athens University of Economics & Business Athens Greece
This paper focuses on the security protocols enacted in banking transactions across the European Economic Area (EEA), as stipulated by the Second or Revised Payment Service Directive (commonly referred to as ‘PSD2’ ...
来源: 评论
Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant security Controls
Blockchain-Enhanced Framework for Secure Third-Party Vendor ...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Gupta, Deepti Elluri, Lavanya Jain, Avi Moni, Shafika Showkat Aslan, Omer Texas A&m University - Central Texas Dept. of Computer Information Systems TX United States College of Business University of Tampa FL United States Embry-Riddle Aeronautical University Dept. of Electrical Engineering and Computer Science FL United States Bandirma Onyedi Eylül University Department of Software Engineering Bandirma Turkey
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks... 详细信息
来源: 评论
Experimental Approach to Internal security Threats for 5G-Advanced Core networks
Experimental Approach to Internal Security Threats for 5G-Ad...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Jaehyoung Park Jihye Kim Seungchan Woo Kyungmin Park Jonghyun Kim Jong-Hyouk Lee Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea Dept. of Computer and Information Security Sejong University Seoul Republic of Korea Dept. of Computer and Information Security & Convergence Engineering for Metaverse Sejong University Seoul Republic of Korea Electronics and Telecommunications Research Institute Daejeon Republic of Korea
As we embrace the dawn of the 5G era, the fusion of Software Defined network (SDN) and network Function Virtualization (NFV) technologies has heralded a new epoch in network architecture. This provides indispensable c... 详细信息
来源: 评论
Taxonomy of Proactive Detection Methods of Drunk Driving for Enhancing Traffic Safety  17
Taxonomy of Proactive Detection Methods of Drunk Driving for...
收藏 引用
17th IEEE International Symposium on Embedded Multicore/Many-core systems-on-Chip, MCSoC 2024
作者: Swiley, Richard Preston Alsulieman, Razan Sherif, Ahmed Elsersy, Mohamed Khalil, Kasem University of Southern Mississippi School of Computing Sciences and Computer Engineering MS United States Higher Colleges of Technology Computer and Information Systems Dept. AlAin Abu Dhabi United Arab Emirates University of Mississippi Electrical and Computer Engineering Department MS United States
Drunk driving continues to be a substantial public health issue, leading to a multitude of accidents and deaths on a global scale. Conventional techniques for identifying drunk driving, such as breathalyzers and field... 详细信息
来源: 评论
High-Speed CBJT Operational Amplifier with AB Class Input Stage
High-Speed CBJT Operational Amplifier with AB Class Input St...
收藏 引用
Wave Electronics and its Application in information and Telecommunication systems (WECONF)
作者: D. V. Kuznetsov D. V. Kleimenkin I. A. Alferova A. V. Bugakova dept. of Scientific Research dept. of Information Systems and Radio Engineering Don State Technical University Rostov-on-Don Russia dept. of Scientific Research dept. of Cyber Security of Information Systems Don State Technical University Rostov-on-Don Russia
A circuit technique for increasing the maximum slew rate (SR) of the output voltage of a classical CBJT operational amplifier (OpAmp) with an AB class input stage, which has become the basis for several commercially a... 详细信息
来源: 评论
ML-Inspired Multiple Relay Selection in UAV-Enabled Untrusted networks
ML-Inspired Multiple Relay Selection in UAV-Enabled Untruste...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Lefteris Tsipi Emmanouel T. Michailidis Konstantinos Maliatsos Demosthenes Vouyioukas Dept. of Information and Communication Systems Engineering University of the Aegean Samos Greece Dept. of Informatics and Computer Engineering University of West Attica Egaleo Greece Dept. of Digital Systems University of Piraeus Piraeus Greece
In this paper, multiple relay selection (MRS) schemes for untrusted unmanned aerial vehicle (UAV)-enabled networks are proposed. In this context, various machine learning (ML) models are employed to improve secrecy pe... 详细信息
来源: 评论
Comparative Evaluation of Machine Learning-Based Controller Area network Intrusion Detection systems
Comparative Evaluation of Machine Learning-Based Controller ...
收藏 引用
International Conference on information and Communication systems (ICICS)
作者: Omar Y. Al-Jarrah Omar A. Ramadan Baha Alsaify Suboh Alkhushayni Dept. Network Engineering and Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Dept. Mechanical Engineering Faculty of Engineering Jordan University of Science and Technology Irbid Jordan Dept. Information Systems Yarmouk University Irbid Jordan
The controller area network (CAN) protocol is widely used in vehicle networks. However, it lacks essential security features like confidentiality and authentication. To enhance vehicle security, researchers have propo...
来源: 评论