咨询与建议

限定检索结果

文献类型

  • 605 篇 会议
  • 104 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 344 篇 计算机科学与技术...
    • 297 篇 软件工程
    • 137 篇 信息与通信工程
    • 57 篇 控制科学与工程
    • 41 篇 生物工程
    • 38 篇 安全科学与工程
    • 36 篇 电气工程
    • 34 篇 电子科学与技术(可...
    • 32 篇 生物医学工程(可授...
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 21 篇 网络空间安全
    • 20 篇 光学工程
    • 16 篇 机械工程
    • 15 篇 建筑学
    • 14 篇 仪器科学与技术
  • 160 篇 理学
    • 84 篇 数学
    • 46 篇 生物学
    • 30 篇 物理学
    • 23 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 14 篇 化学
  • 121 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 53 篇 法学
    • 35 篇 社会学
    • 18 篇 法学
  • 27 篇 医学
    • 19 篇 公共卫生与预防医...
    • 18 篇 基础医学(可授医学...
    • 18 篇 临床医学
  • 13 篇 经济学
  • 9 篇 农学
  • 8 篇 文学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 36 篇 accuracy
  • 26 篇 security
  • 24 篇 deep learning
  • 24 篇 computational mo...
  • 21 篇 protocols
  • 19 篇 real-time system...
  • 19 篇 feature extracti...
  • 18 篇 access control
  • 18 篇 machine learning
  • 18 篇 cryptography
  • 16 篇 support vector m...
  • 16 篇 cloud computing
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 software
  • 15 篇 privacy
  • 14 篇 internet of thin...
  • 14 篇 predictive model...
  • 14 篇 convolutional ne...
  • 13 篇 authentication

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of automat...
  • 8 篇 dept. of softwar...
  • 7 篇 dept. of automat...
  • 7 篇 ufa state aviati...
  • 6 篇 sejong universit...
  • 5 篇 dept of cyber se...
  • 5 篇 protocol enginee...
  • 5 篇 sejong universit...
  • 5 篇 dept. of cyber s...
  • 5 篇 dept. of network...
  • 5 篇 dept. of compute...
  • 5 篇 dept of school o...
  • 5 篇 university of th...
  • 5 篇 american express...
  • 5 篇 dept. of compute...
  • 4 篇 department of cy...
  • 4 篇 dept. of electri...
  • 4 篇 computer science...

作者

  • 11 篇 sandhu ravi
  • 11 篇 jong-hyouk lee
  • 8 篇 chen bing
  • 8 篇 lee jong-hyouk
  • 8 篇 vulfin alexey
  • 7 篇 young-gab kim
  • 6 篇 christos liaskos
  • 6 篇 dimitrios tyrovo...
  • 6 篇 krishnan ram
  • 6 篇 nataliia zaiets
  • 6 篇 lidiia vlasenko
  • 6 篇 nataliia lutska
  • 5 篇 sotiris ioannidi...
  • 5 篇 vlasenko lidiia
  • 5 篇 zou xiang
  • 5 篇 hisham a. kholid...
  • 5 篇 zaiets nataliia
  • 5 篇 abdul sajid moha...
  • 5 篇 george k. karagi...
  • 5 篇 tengku mohd teng...

语言

  • 658 篇 英文
  • 50 篇 其他
  • 3 篇 中文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Cyber Security and Computer Engineering"
713 条 记 录,以下是1-10 订阅
排序:
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Enhancing IoT security Through Hardware security Modules (HSMs)  5
Enhancing IoT Security Through Hardware Security Modules (HS...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Khan, Mansoor Ilyas, Muhammad Bayat, Oguz Al ain University Dept. of Cyber Security Al ain United Arab Emirates Altinbas University Electrical and Computer Engineering Istanbul Turkey
Strong security measures must be integrated in an era where data security is critical, particularly for sensitive data handled by IoT devices. In order to strengthen Internet of Things security, the use of Hardware Se... 详细信息
来源: 评论
Leveraging Digital Twins for ON/OFF-LINE Blockchain Networks: A Resilient Framework for Drone and IoT Communication  39
Leveraging Digital Twins for ON/OFF-LINE Blockchain Networks...
收藏 引用
39th International Conference on Information Networking, ICOIN 2025
作者: Park, Seong Su Kim, Ki-Hyung Ajou University Suwon Dept. Computer Engineering Korea Republic of Ajou University Suwon Dept. Cyber Security Korea Republic of
In this paper, we propose a novel framework for leveraging digital twins to enhance ON/OFF-LINE blockchain networks in drone and IoT communication systems. The proposed solution addresses critical challenges in enviro... 详细信息
来源: 评论
Enhanced Intrusion Detection System Using Hybrid Harris Hawks Inspired Feature Selection For Efficient Network Intrusion Detection  1
Enhanced Intrusion Detection System Using Hybrid Harris Hawk...
收藏 引用
1st IEEE International Conference on Computing and Data Science, ICCDS 2024
作者: Kalaiselvi, B. Gogul, S. Siva, S. Dhineshkumar, R. Logeshwaran, M. Mahendra Engineering College Dept.of CSE Namakkal India Mahendra Engineering college Dept. Cyber Security Namakkal India
Anomaly-based Intrusion Detection Systems (IDS) playa crucial role in identifying network breaches by detecting deviations from baseline patterns. However, existing methods often struggle to accurately differentiate b... 详细信息
来源: 评论
security and Threat Detection through Cloud-Based Wazuh Deployment  1
Security and Threat Detection through Cloud-Based Wazuh Depl...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Moiz, Syed Majid, Abdul Basit, Abdul Ebrahim, Mansoor Abro, Abdul Ahad Naeem, Mehwish Iqra University Dept. of Computer Science Karachi Pakistan Dept. of Cyber Security Karachi Pakistan Indus University Dept. of Computer Science Karachi Pakistan Iqra University Dept. of Software Engineering Karachi Pakistan University Libre de Bruxelles Brussels Belgium
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets... 详细信息
来源: 评论
Deep Learning-Based SBOM Defect Detection for Medical Devices  6
Deep Learning-Based SBOM Defect Detection for Medical Device...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Kim, Heeyeon Kim, Ki-Hyung Ajou University Dept. Knowledge Information Engineering Suwon Korea Republic of Ajou University Dept. Cyber Security Suwon Korea Republic of
This paper focuses on the digital innovation brought about by the advancement of ICT technology in the healthcare field. In particular, the introduction of cutting-edge technologies such as AI are contributing to the ... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for cybersecurity & Network security  5
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Shaw, Ranju Parveen, Suraiya Jamia Hamdard University Dept. of Computer Science Engineering with Specialization in Cyber Forensic Information Security Delhi India Faculty at Jamia Hamdard University Sest Department of Computer Science Engineering Delhi India
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t... 详细信息
来源: 评论
Learning Style Classification: An Efficient Modeling of DNN-PCA with Facial Expressions  2
Learning Style Classification: An Efficient Modeling of DNN-...
收藏 引用
2nd International Conference Computational and Characterization Techniques in engineering and Sciences, IC3TES 2024
作者: Gambo, Farouk Lawan Prassad, Rajesh Abdullahi, Aminu Aliyu Federal University Dutse Dept. of Cyber Security Jigawa Nigeria African University of Science and Technology Dept. of Computer Science Abuja Nigeria Federal University Dutse Dept. of Computer Science Jigawa Nigeria
Individual learning style offer insights to both students and teachers to effectively organize learning activities and materials accordingly to optimize learning process. Learning style defined students' preferred... 详细信息
来源: 评论
Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN  35
Simulation of an ARP Spoofing Attack on the E2 Interface in ...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff... 详细信息
来源: 评论
Cultural Algorithms Unveiled: A Comparative Analysis for Anomaly Detection  21
Cultural Algorithms Unveiled: A Comparative Analysis for Ano...
收藏 引用
21st International Learning and Technology Conference, L and T 2024
作者: Al-Tirawi, Anas Abumathkour, Raghda'A Miralam, Lamar Dar Al-Hekma University Dept. of Computer Science Jeddah Saudi Arabia Dar Al-Hekma University Dept. of Cyber Security Jeddah Saudi Arabia
Anomaly detection plays a pivotal role in network traffic and intrusion systems. Several Evolutionary Algorithms (EAs) have been employed to address this challenge. This paper presents a comparative analysis of variou... 详细信息
来源: 评论