咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 15,066 篇 期刊文献
  • 430 册 图书

馆藏范围

  • 45,824 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,068 篇 工学
    • 19,575 篇 计算机科学与技术...
    • 15,822 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,764 篇 控制科学与工程
    • 3,143 篇 电气工程
    • 3,070 篇 生物工程
    • 2,844 篇 电子科学与技术(可...
    • 2,527 篇 生物医学工程(可授...
    • 2,104 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,538 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,167 篇 化学工程与技术
    • 1,117 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,735 篇 理学
    • 7,087 篇 数学
    • 4,613 篇 物理学
    • 3,519 篇 生物学
    • 2,317 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,389 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,593 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,828 篇 医学
    • 2,411 篇 临床医学
    • 2,113 篇 基础医学(可授医学...
    • 1,270 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,152 篇 社会学
  • 946 篇 经济学
  • 716 篇 农学
  • 714 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,104 篇 deep learning
  • 1,085 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 849 篇 internet of thin...
  • 810 篇 computational mo...
  • 682 篇 training
  • 567 篇 information tech...
  • 561 篇 real-time system...
  • 561 篇 artificial intel...
  • 543 篇 support vector m...
  • 505 篇 data mining
  • 487 篇 security
  • 454 篇 predictive model...
  • 406 篇 monitoring
  • 388 篇 cloud computing
  • 359 篇 optimization
  • 354 篇 reliability
  • 350 篇 data models

机构

  • 297 篇 faculty of scien...
  • 290 篇 department for p...
  • 281 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 272 篇 department of ph...
  • 270 篇 department of ph...
  • 253 篇 faculté des scie...
  • 235 篇 department of ph...
  • 232 篇 department of co...
  • 230 篇 department of ph...
  • 218 篇 physics division...
  • 195 篇 cavendish labora...
  • 172 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 162 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 255 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 245 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 235 篇 d. guest
  • 217 篇 y. nagasaka

语言

  • 40,466 篇 英文
  • 4,887 篇 其他
  • 471 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45824 条 记 录,以下是4661-4670 订阅
排序:
Exploring Low Rate Dos Attack Detection Methods: A Bibliometric Analysis and Roadmap for Further Research
Exploring Low Rate Dos Attack Detection Methods: A Bibliomet...
收藏 引用
2023 IEEE International Conference on Data and Software Engineering, ICoDSE 2023
作者: Widodo, Anteng Rochim, Adian Fatchur Warsito, Budi School of Postgraduated Studies Diponegoro University Doctoral Program of Information System Semarang Indonesia Muria Kudus University Faculty of Engineering Department of Information System Kudus Indonesia Diponegoro University Faculty of Engineering Department of Computer Engineering Semarang Indonesia Diponegoro University Faculty of Science and Mathematics Department of Statistics Semarang Indonesia
Low-Rate Denial of Service (LDoS) attacks, an emerging breed of DoS attacks, present a formidable challenge in terms of their detectability. Within the realm of network security, these attacks cast a substantial shado... 详细信息
来源: 评论
An Automated Multi-Level Convolutional Neural Network Approach for Classification of White Blood Cells  14
An Automated Multi-Level Convolutional Neural Network Approa...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Sangeetha, M. Tamizarasu, K. Devi, R. Manjula Arokiaraj, Rex MacEdo Sudha, K. Kumar, K. Kavin Dr.N.G.P. Institute of Technology Department of Information Technology Tamilnadu Coimbatore India K S R Institute for Engineering and Technology Department of Computer Science and Engineering Tamilnadu Namakkal India Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Tamilnadu Coimbatore India -CAS Department of Information Technology Ibri Oman K S R Institute for Engineering and Technology Department of Cyber Security Tamilnadu Namakkal India Kongu Engineering College Department of Ece Tamilnadu Perundurai India
Blood cells known as white blood cells (or leukocytes) are generated in the marrow of the bone marrow and circulate through the circulatory system and lymph tissue. White blood cells (WBC) are the cells responsible fo... 详细信息
来源: 评论
Semi-Supervised Malware Traffic Classification Via Consistency Regularization and Pseudo-Labeling  23
Semi-Supervised Malware Traffic Classification Via Consisten...
收藏 引用
23rd IEEE International Conference on Communication technology, ICCT 2023
作者: Jiao, Qianlong Zhang, Xixi Zhang, Weijie Miao, Fucheng Ohtsuki, Tomoaki Adebisi, Bamidele Wang, Yu Gui, Guan College of Telecommunications and Information Engineering Njupt Nanjing China Reading Academy Nanjing University of Information Science and Technology Nanjing China Nanjing Great Information Technology Co. Ltd Nanjing China Keio University Department of Information and Computer Science Yokohama Japan Manchester Metropolitan University Faculty of Science and Engineering Manchester United Kingdom
Malware traffic classification (MTC) technology plays a crucial role in cyber security by serving as the first step of network intrusion detection system. Recently, deep learning has been successfully introduced into ... 详细信息
来源: 评论
Leveraging the fog-based machine learning model for ECG-based coronary disease prediction
收藏 引用
International Journal of Business Intelligence and Data Mining 2022年 第3期21卷 328-353页
作者: Hanumantharaju, R. Shreenath, K.N. Sowmya, B.J. Srinivasa, K.G. Department of Computer Science and Engineering M S Ramaiah Institute of Technology Bangalore India Department of Computer Science and Engineering Siddaganga Institute of Technology Tumakuru India Visvesvaraya Technological University Belagavi India Information Management and Emerging Engineering National Institute of Technical Teachers Training and Research Chandigarh India
Smart healthcare systems need a remote monitoring system based on the internet of things. Smart healthcare services are an innovative way of synergising the benefits of sensors for large-scale analytics to communicate... 详细信息
来源: 评论
Task Scheduling for Multi-Objective Optimization in Cloud Computing: A Review
SSRN
收藏 引用
SSRN 2023年
作者: Abdulghani, Abdulrahman M. Department of Computer Science Faculty of Computer Science and Information Technology University Putra Malaysia Serdang Malaysia
Nowadays, cloud computing technologies witness a huge turnout in our life which in turn cause a tremendous demand by users who consume the services deployed by the cloud providers, not to mention the virtualization an... 详细信息
来源: 评论
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performance of File Cluster Types  1
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Ali, Rabei Raad Dawd, Lahib Nidhal Mostafa, Salama A. Rachmawanto, Eko Hari Jubair, Mohammed Ahmed National University of Science and Technology Thi-Qar Nasiriyah Iraq Computer Techniques Engineering Department Dijlah University College Baghdad Iraq Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Batu Pahat Malaysia Department of Informatics Engineering Dian Nuswantoro University 207 Imam Bonjol Street Semarang50131 Indonesia Department of Computer Technical Engineering College of Information Technology Imam Ja’afar Al-Sadiq University Al-Muthanna66002 Iraq
Accurate file recovery of the corrupted or fragmented file is a very important task when missing the file system, since file recovery procedure involves methods, techniques, and tools that analyze and classify the con... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs: Precision in Vulnerability Detection: Advanced Slicing Techniques for Binary Program Analysis  7
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
7th International Conference on computer science and Artificial Intelligence, CSAI 2023
作者: Chukkol, Abdulrahman Hamman Adama Luo, Senlin Yunusa, Haruna Yusuf, Abdulganiyu Abdu Mohammed, Abulfatahi School of Information and Electronics Beijing Institute of Technology Beijing China Information System and Security and Countermeasures Experimental Center Beijing Institute of Technology Beijing China School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science Beijing Institute of Technology Beijing China School of Management and Information Technology Modibbo Adama University Yola Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Smart Healthcare Monitoring system: Integrating IoT, Deep Learning, and XGBoost for Real-Time Patient Diagnosis  21
Smart Healthcare Monitoring System: Integrating IoT, Deep Le...
收藏 引用
21st OITS International Conference on information technology, OCIT 2023
作者: Paulraj, Kruthika Soms, Nisha David Samuel Azariya, S. Sathya Priya, S. Jeba Emilyn, J. Sureshkumar, Vidhushavarshini Sona College of Technology Department of Information Technology Tamil Nadu Salem India KPR Institute of Engineering and Technology Department of Computer Science Tamil Nadu Coimbatore India M. Kumarasamy College of Engineering Department of Artificial Intelligence and Data Science Tamil Nadu Karur India SRMIST Department of Computer Science Engineering Tamil Nadu Chennai India
Integrating the Internet of Things (IoT), Deep Learning (DL), and the XGBoost algorithm has paved the way for transformative advancements in healthcare. This paper presents a pioneering study on a "Smart Healthca... 详细信息
来源: 评论
Optimization of Cognitive Radio system Using Self-Learning Salp Swarm Algorithm
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3821-3835页
作者: Nitin Mittal Harbinder Singh Vikas Mittal Shubham Mahajan Amit Kant Pandit Mehedi Masud Mohammed Baz Mohamed Abouhawwash Department of Electronics&Communication Engineering Chandigarh UniversityMohali140413India School of VLSI Design and Embedded Systems National Institute of TechnologyKurukshetra136119India School of Electronics&Communication Engineering Shri Mata Vaishno Devi UniversityKatra182320India Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
CognitiveRadio(CR)has been developed as an enabling technology that allows the unused or underused spectrum to be used dynamically to increase spectral *** improve the overall performance of the CR systemit is extreme... 详细信息
来源: 评论