咨询与建议

限定检索结果

文献类型

  • 59 篇 会议
  • 15 篇 期刊文献

馆藏范围

  • 74 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 46 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 14 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
  • 18 篇 理学
    • 13 篇 数学
    • 4 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学

主题

  • 6 篇 cryptography
  • 4 篇 training
  • 3 篇 zero-shot learni...
  • 3 篇 wireless communi...
  • 3 篇 wireless sensor ...
  • 3 篇 malware
  • 2 篇 intrusion detect...
  • 2 篇 reliability
  • 2 篇 public key crypt...
  • 2 篇 computer archite...
  • 2 篇 transfer learnin...
  • 2 篇 optimization
  • 2 篇 data mining
  • 2 篇 authentication
  • 2 篇 few shot learnin...
  • 2 篇 students
  • 2 篇 software
  • 2 篇 technological in...
  • 2 篇 collaboration
  • 2 篇 sensors

机构

  • 3 篇 office of networ...
  • 3 篇 office of naval ...
  • 3 篇 department of co...
  • 2 篇 institute for in...
  • 2 篇 the university o...
  • 2 篇 the 3rd research...
  • 2 篇 dept. of electri...
  • 2 篇 research center ...
  • 2 篇 internet network...
  • 2 篇 dept. of operati...
  • 2 篇 dept. of mathema...
  • 2 篇 eurecom
  • 2 篇 office of networ...
  • 2 篇 computer eng. de...
  • 2 篇 security in tele...
  • 2 篇 dept. of compute...
  • 2 篇 athens universit...
  • 2 篇 the university o...
  • 2 篇 electrical engin...
  • 2 篇 thales communica...

作者

  • 4 篇 kiekintveld chri...
  • 4 篇 chen bing
  • 4 篇 piplai aritran
  • 4 篇 wagler amy
  • 4 篇 ige tosin
  • 4 篇 kolade olukunle
  • 3 篇 weng jian
  • 2 篇 park jong sou
  • 2 篇 iordanis koutsop...
  • 2 篇 tosin ige
  • 2 篇 quisquater jean-...
  • 2 篇 zou xiang
  • 2 篇 antonio m. cipri...
  • 2 篇 thanasis korakis
  • 2 篇 bolanle hafiz ma...
  • 2 篇 wang yongjian
  • 2 篇 aritran piplai
  • 2 篇 raymond knopp
  • 2 篇 lu haibing
  • 2 篇 navid nikaein

语言

  • 70 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"机构=Dept. of Network and Computer Security"
74 条 记 录,以下是1-10 订阅
排序:
Robust Facial Emotion Recognition System via De-Pooling Feature Enhancement and Weighted Exponential Moving Average
Robust Facial Emotion Recognition System via De-Pooling Feat...
收藏 引用
2024 IEEE Region 10 Conference, TENCON 2024
作者: Win, Khin Cho Akhtar, Zahid Mohan, C. Krishna Indian Institute of Technology Dept. of Artificial Intelligence Hyderabad India State University of New York Polytechnic Institute Dept. of Network and Computer Security UticaNY United States Indian Institute of Technology Dept. of Computer Science and Engineering Hyderabad India
Facial expression recognition (FER) in an uncontrolled environment presents a formidable challenge in affective computing and human-machine interaction domains. Existing FER models fail to generalize due to the innate... 详细信息
来源: 评论
SES: Smart Education System  5
SES: Smart Education System
收藏 引用
5th International Conference on computer and Applications, ICCA 2023
作者: Alyammahi, Wadha Alrabaee, Saed United Arab Emirates University College of Information Technology Dept. of Computer and Network Engineering Dept. of Information Systems and Security AlAin United Arab Emirates
Responding to inefficiencies in traditional classroom management methods, this paper proposes an innovative, technology-driven approach to enhance educational processes. Central to our proposal is the development of a... 详细信息
来源: 评论
NetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by network Monitoring Software  14
NetMiner: Identifying Failure-Inducing Patterns in the Logs ...
收藏 引用
14th International Conference on Computing Communication and networking Technologies, ICCCNT 2023
作者: Sathi, Gowtham Reddy Vedullapalli, Lokesh Kishan, MacHarla Hemanth Zaman, Tarannum Shaila Islam, Md Tariqul Badr, Mahmoud M. Suny Polytechnic Institute Dept. of Computer and Information Science UticaNY United States SyracuseNY United States Suny Polytechnic Institute Dept. of Network and Computer Security UticaNY United States
To ensure uninterrupted network communication among multiple sources, the network administrator needs to do real-time monitoring of network logs. Due to its huge volume and streaming nature, it is almost impossible to... 详细信息
来源: 评论
Investigating Online Searching Behavior Based on Google Trends in MENA Region Before and After COVID-19  53
Investigating Online Searching Behavior Based on Google Tren...
收藏 引用
53rd IEEE ASEE Frontiers in Education International Conference, FIE 2023
作者: Belkacem, Abdelkader Nasreddine Jamil, Nuraini Alrabaee, Saed College of It Uae University Dept. of Computer and Network Engineering Al Ain United Arab Emirates College of It Uae University Dept. of Computer Science and Software Engineering Al Ain United Arab Emirates College of It Uae University Dept. of Information Systems and Security Al Ain United Arab Emirates
The outbreak of the coronavirus disease (COVID-19) has had a profound impact on education worldwide. The rise of remote learning is one of the most significant changes in this regard, as many schools and universities ... 详细信息
来源: 评论
A study on the Application of Multilevel Secure Hash Function in Blockchain  2
A study on the Application of Multilevel Secure Hash Functio...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Jin, Shi-Mei Wang, Yi-Han Li, Yongzhen Yanbian University Information Technology Education Yanji133000 China Yanbian University Network Communication and Information Security Lab. Dept. of Computer Science and Technology Yanji133000 China
With the rapid development and upgrade of the social network and IT, information security has become increasingly significant. Hash function has become a research key-point in the field of information security. To mee... 详细信息
来源: 评论
A Hypothesis Testing-based Framework for Cyber Deception with Sludging  60
A Hypothesis Testing-based Framework for Cyber Deception wit...
收藏 引用
60th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2024
作者: Kumar, Abhinav Brahma, Swastik Geng, Baocheng Kamhoua, Charles A. Varshney, Pramod K. University of Cincinnati Department of Computer Science OH United States University of Alabama Department of Computer Science BirminghamAL United States Network Security Branch DEVCOM Army Research Laboratory MD United States Syracuse University Dept. of Electrical Eng. and Computer Science NY United States
In this paper, we present a novel hypothesis testing framework to model an attacker's decision-making during the reconnaissance phase and employ the framework to design strategic deception strategies that can prov... 详细信息
来源: 评论
Towards an in-dept. Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection
Towards an in-Depth Evaluation of the Performance, Suitabili...
收藏 引用
2024 International Symposium on networks, computers and Communications, ISNCC 2024
作者: Ige, Tosin Kiekintveld, Christopher Piplai, Aritran Wagler, Amy Kolade, Olukunle Hafiz Matti, Bolanle The University of Texas Dept. of Computer Science El PasoTXUSA United States The University of Texas Dept. of Public Health Science El PasoTX United States United State Navy Office of Naval Research Pentagon United States Palo Alto Networks Inc Office of Network Security TX United States
The emergence of few-shot learning as a potential approach to address the problem of data scarcity by learning underlying pattern from a few training sample had so far given a mix-result especially on the suitability ... 详细信息
来源: 评论
An in-dept. Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection
An in-Depth Investigation Into the Performance of State-of-t...
收藏 引用
2024 International Symposium on networks, computers and Communications, ISNCC 2024
作者: Ige, Tosin Kiekintveld, Christopher Piplai, Aritran Wagler, Amy Kolade, Olukunle Hafiz Matti, Bolanle The University of Texas Dept. of Computer Science El PasoTX United States The University of Texas Dept. of Public Health Science El PasoTX United States Office of Naval Research United State Navy Pentagon United States Office of Network Security Palo Alto Networks Inc TX United States
N-shot learning has emerge in recent year as poten-tial learning approach to solve the problem of data scarcity by learning underlying pattern from a few training sample. Despite recent state-of-the-art research on mo... 详细信息
来源: 评论
Enhancing the Transportation of Students with Disabilities on Campus  3
Enhancing the Transportation of Students with Disabilities o...
收藏 引用
3rd International Conference on Innovative Research in Applied Science, Engineering and Technology, IRASET 2023
作者: Ibrahim, Walid Alshamsi, Shaikha Alnuaimi, Salama Alneyadi, Alia Aldhaheri, Salama Alsalmi, Aysha Amer, Hoda Uae University Network and Comp. Eng. Dept. Al ain United Arab Emirates United Arab Emirates Univeristy Info. Systems & Security Dept. Al Ain United Arab Emirates United Arab Emirates Univeristy Computer Science Dept. Al Ain United Arab Emirates
Access to education has always been aconstitutional right provided by countries to their citizens. To fosterinclusion and equality, many countries have made tangible efforts recently toinclude students with disabiliti... 详细信息
来源: 评论
Comparative Evaluation of Machine Learning-Based Controller Area network Intrusion Detection Systems  14
Comparative Evaluation of Machine Learning-Based Controller ...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Al-Jarrah, Omar Y. Ramadan, Omar A. Alsaify, Baha Alkhushayni, Suboh Jordan University of Science and Technology Faculty of Computer and Information Technology Dept. Network Engineering and Security P.O. Box 3030 Irbid22110 Jordan Jordan University of Science and Technology Faculty of Engineering Dept. Mechanical Engineering P.O. Box 3030 Irbid22110 Jordan Yarmouk University Dept. Information Systems Irbid Jordan
The controller area network (CAN) protocol is widely used in vehicle networks. However, it lacks essential security features like confidentiality and authentication. To enhance vehicle security, researchers have propo... 详细信息
来源: 评论