咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是101-110 订阅
排序:
Blockchain-based color medical image cryptosystem for industrial Internet of Healthcare Things (IoHT)
收藏 引用
Multimedia Tools and Applications 2024年 1-55页
作者: Khallaf, Fatma El-Shafai, Walid El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Faculty of Engineering Ahram Canadian University 6th October City Giza Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
In recent years, the proliferation of smart devices and associated technologies, such as the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Internet of Medical Things (IoMT), has witnessed a subst... 详细信息
来源: 评论
Advancing Stroke Prediction: Explainable Machine Learning Models and Data Augmentation Strategies  25
Advancing Stroke Prediction: Explainable Machine Learning Mo...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Salma, Rahma Abu Al-Qerem, Ahmad Iessa, Abedalhakeam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Stroke, a leading global disability cause, affects 12 million people annually, with 6.5 million dying. Preventing at least half of strokes requires public policy action and increased awareness. Early diagnosis is cruc... 详细信息
来源: 评论
IoT Network Forensics based on Transport Layer
IoT Network Forensics based on Transport Layer
收藏 引用
2023 IEEE Conference on computer Applications, ICCA 2023
作者: Naing, Soe Kalayar Oo, Su Thet Oo, Hnin Wit Yi Lin, Phyo Yatanar Nwe, Khin Mya Thwin, Mie Mie Su University of Computer Studies Faculty of Computer Science Yangon Yangon Myanmar University of Computer Studies Yangon Yangon Myanmar University of Computer Studies Faculty of Computer System and Technology Yangon Yangon Myanmar University of Computer Studies Information Technology Support and Maintenance Yangon Yangon Myanmar University of Computer Studies Cyber Security Lab Yangon Yangon Myanmar
The IoT is concerned in every part of the human beings such as medical care, education, smart cities, home automation, and many business fields. While the IoT gives a myriad of benefits, security remains the biggest i... 详细信息
来源: 评论
CrossCert: A Privacy-Preserving Cross-Chain System for Educational Credential Verification Using Zero-Knowledge Proof  10th
CrossCert: A Privacy-Preserving Cross-Chain System for Educ...
收藏 引用
10th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2024
作者: Tran, Tuan-Dung Minh, Phong Khuu Thuy, Trang Le Tran Duy, Phan The Cam, Nguyen Tan Pham, Van-Hau Faculty of Computer Networks and Communications University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh City Viet Nam Information Security Laboratory University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh City Viet Nam
Across various industries, credential verification stands as a critical requirement, yet traditional approaches face limitations in security, privacy, and interoperability. Although recent blockchain innovations promi... 详细信息
来源: 评论
Reimagine Sentiments in Nature Language through Crystalize- Water Visualization  5
Reimagine Sentiments in Nature Language through Crystalize- ...
收藏 引用
5th International Conference on Artificial Intelligence and Data Sciences, AiDAS 2024
作者: Png, Wen-Hao Chang, Fang-Yu Lo, Jie-Jin Hsu, Su-Chu Faculty of Information and Computer Technology Universiti Tunku Abdul Rahman Kampar Malaysia Institute of Information Systems and Applications National Tsing Hua University Hsinchu Taiwan Institute of Information Security National Tsing Hua University Hsinchu Taiwan Research Center for Technology and Art National Tsing Hua University Hsinchu Taiwan
Text art translates words into artworks through various mediums, including neon signage, light art, and hand- painted or drawn text. The visual representations focus on the typographical design and the ideas and meani... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论
Medichain: A Multi-chain Based System for Managing Prescription Medications Using Zero Knowledge Proofs
Medichain: A Multi-chain Based System for Managing Prescrip...
收藏 引用
International Conference on Intelligent Systems and Networks, ICISN 2024
作者: Tran, Tuan-Dung Duc, Minh Tran Thuy, Trang Le Tran Duy, Phan The Cam, Nguyen Tan Pham, Van-Hau Faculty of Computer Networks and Communications University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh City Viet Nam Information Security Laboratory University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh City Viet Nam
The abuse of prescription medications has become a severe public health crisis fueled by limited coordination and oversight across healthcare systems. Current frameworks lack interoperability between doctors, pharmaci... 详细信息
来源: 评论
Game Theory-Based IoT Efficient Power Control in Cognitive UAV
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1561-1578页
作者: Fadhil Mukhlif Norafida Ithnin Omar B.Abdulghafoor Faiz Alotaibi Nourah Saad Alotaibi Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi MalaysiaJohorMalaysia Electronic and Telecommunication Department College of EngineeringThe American University of KurdistanIraq Faculty of Computer Science and Information Technology Universiti Putra MalaysiaSelangorMalaysia Computer Department Faculty of Applied CollegeImam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia
With the help of network densification,network coverage as well as the throughput can be improved via ultra-dense networks(UDNs).In tandem,Unmanned Aerial Vehicle(UAV)communications have recently garnered much attenti... 详细信息
来源: 评论
An Efficient Intrusion Detection Framework for Industrial Internet of Things security
收藏 引用
computer Systems Science & Engineering 2023年 第7期46卷 819-834页
作者: Samah Alshathri Ayman El-Sayed Walid El-Shafai Ezz El-Din Hemdan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... 详细信息
来源: 评论
Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical Representation  25
Simulating a Finite-State Markov Chain for Rayleigh Block-Fa...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Al-Hihi, Mohammad Rachini, Ali Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Erlangen Germany Department of Computer Science and Information Technology Jounieh Lebanon Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
In the proposed paper, simulating the Finite State Markov Chain (FSMC) to be implemented as Rayleigh Block-fading channel. Indeed, FSMC is regarded as a practical fading channel because of its random choice for future... 详细信息
来源: 评论