咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 26 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 5 篇 控制科学与工程
    • 2 篇 信息与通信工程
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
    • 1 篇 公安技术
  • 8 篇 理学
    • 3 篇 生物学
    • 2 篇 化学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 cybersecurity
  • 3 篇 blockchain
  • 3 篇 digital forensic...
  • 2 篇 data privacy
  • 2 篇 steganography
  • 2 篇 protocols
  • 2 篇 technological in...
  • 2 篇 vehicles
  • 1 篇 internet of thin...
  • 1 篇 global positioni...
  • 1 篇 cyber attacks
  • 1 篇 jpeg
  • 1 篇 smart homes
  • 1 篇 intrusion detect...
  • 1 篇 charge coupled d...
  • 1 篇 image matching
  • 1 篇 roads
  • 1 篇 cognition
  • 1 篇 elliptic curve c...
  • 1 篇 color image fore...

机构

  • 4 篇 department of co...
  • 2 篇 fraunhofer fkie ...
  • 2 篇 center of excell...
  • 2 篇 cyber security g...
  • 2 篇 forensics and se...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 forensics and se...
  • 2 篇 department of co...
  • 2 篇 state key labora...
  • 2 篇 division of cybe...
  • 1 篇 nottingham trent...
  • 1 篇 applied artifici...
  • 1 篇 arizona state un...
  • 1 篇 centre for digit...
  • 1 篇 control theory a...
  • 1 篇 school of comput...
  • 1 篇 division of cybe...
  • 1 篇 school of comput...
  • 1 篇 school of cyber ...

作者

  • 3 篇 scanlon mark
  • 3 篇 sheppard john
  • 2 篇 haggerty john
  • 2 篇 vaarandi risto
  • 2 篇 hariharasitarama...
  • 2 篇 almond peter
  • 2 篇 r. raja subraman...
  • 2 篇 berry tom
  • 2 篇 subramanian r. r...
  • 2 篇 gresty david
  • 2 篇 irfan alam
  • 2 篇 hilgert jan-nicl...
  • 2 篇 hargreaves chris...
  • 2 篇 breitinger frank
  • 2 篇 taylor mark
  • 2 篇 p. chinnasamy
  • 2 篇 siraj a. shaikh
  • 1 篇 visky gabor
  • 1 篇 feldman stuart
  • 1 篇 xiangyang luo

语言

  • 38 篇 英文
  • 3 篇 其他
检索条件"机构=Forensics Computing and Security"
41 条 记 录,以下是1-10 订阅
排序:
A Systematic Literature Review of Cyber security Monitoring in Maritime
收藏 引用
IEEE Access 2025年 13卷 85307-85329页
作者: Vaarandi, Risto Tsiopoulos, Leonidas Visky, Gabor Rehman, Muaan Ur Bahsi, Hayretdin Tallinn University of Technology Centre for Digital Forensics and Cyber Security Department of Software Science Tallinn19086 Estonia Northern Arizona University School of Informatics Computing and Cyber Systems FlagstaffAZ86011 United States
In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure. Although several literature review papers have been... 详细信息
来源: 评论
ReACT_OCRS: An AI-Driven Anonymous Online Reporting System Using Synergized Reasoning and Acting in Language Models
收藏 引用
IEEE Access 2025年 13卷 92800-92815页
作者: Shaker Mahmoud, Amir A. Shishah, Wesam Mistry, Nilay R. National Forensic Sciences University School of Digital Forensics and Cyber Security Gandhinagar India Saudi Electronic University College of Computing and Informatics Riyadh Saudi Arabia
Victims and witnesses of cybercrime often hesitate to report incidents due to concerns over privacy, complexity, and fear of retaliation. Traditional reporting mechanisms require manual data entry, creating accessibil... 详细信息
来源: 评论
Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps:An Ultra-Wide Range Dynamics for Image Encryption
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2161-2188页
作者: De Rosal Ignatius Moses Setiadi T.Sutojo Supriadi Rustad Muhamad Akrom Sudipta Kr Ghosal Minh T.Nguyen Arnold Adimabua Ojugo Research Center for Quantum Computing and Materials Informatics Faculty of Computer ScienceDian Nuswantoro UniversitySemarang50131Indonesia Department of Cyber Forensics and Information Security Behala Government Polytechnic756Upendra Nath Banerjee RoadParnasreeBehalaKolkata700060India Thai Nguyen University of Technology Thai Nguyen UniversityThai Nguyen240000Vietnam Department of Computer Science Federal University of Petroleum ResourcesEffurun330102Nigeria
Data security has become a growing priority due to the increasing frequency of cyber-attacks,necessitating the development of more advanced encryption *** paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotati... 详细信息
来源: 评论
Comparative Evaluation of Deep Learning Models in Alzheimer’s Disease Diagnosis
收藏 引用
Procedia Computer Science 2025年 258卷 2352-2361页
作者: Leena Arya Yogesh Kumar Sharma Smitha Nayak Janaki Sivakumar Assistant Professor Computing Department Muscat College Oman Associate Professor Programme leader Computer security and forensics Department of Computer Science and Creative Technologies Global College of Engineering and Technology Muscat Oman
Alzheimer’s Disease (AD) is an ever-evolving neurodegenerative confusion that influences the neurons of the mind in a manner that hinders the patients’ ability to solve problems and remember issues and that requires... 详细信息
来源: 评论
Design and Implementation of an IoT-based Emergency Alert and GPS Tracking System using MQTT and GSM/GPS Module
Design and Implementation of an IoT-based Emergency Alert an...
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), International Conference on
作者: P. Chinnasamy Pranavdev P. S Chintha Sivakrishnaiah T. Sathiya Irfan Alam Divya Priya Degala Department of Computer Science and Engineering School of Computing Kalasalingam Academy of Research and Education Tamilnadu India Department of MCA Annamacharya University Rajampet India Department of CSE Sona College of Technology Salem Tamilnadu India Cyber Security and Digital Forensics Division SCAI VIT Bhopal University Sehore India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
An optimally optimized emergency response system can prove to be lifesaving by reducing response time during the state of emergency. This paper proposes an IoT-based emergency alert and GPS tracking system implemented... 详细信息
来源: 评论
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
A dark web story in-depth research and study conducted on th...
收藏 引用
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
作者: Rafiuddin, Mohammed Farook Bin Minhas, Hamza Dhubb, Prethpal Singh Forensics Computing and Security Asia Pacific University Malaysia
The following is a research conducted on the Dark Web to study and identify the ins and outs of the dark web, what the dark web is all about, the various methods available to access the dark web and many others. The r... 详细信息
来源: 评论
An empirical study on the performance of java/.net cryptographic APIs
收藏 引用
Information Systems security 2007年 第6期16卷 344-354页
作者: Francia, Guillermo A. Francia, Rahjima R. Computer Security and Forensics Laboratory Mathematical Computing and Information Sciences Department Jacksonville State University Jacksonville AL United States
The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program I... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论
Perceptual Colour-based Geolocation of Human Trafficking Images for Digital Forensic Investigation  3
Perceptual Colour-based Geolocation of Human Trafficking Ima...
收藏 引用
3rd Cyber Research Conference - Ireland, Cyber-RCI 2024
作者: Herrmann, Jessica Bamigbade, Opeyemi Sheppard, John Scanlon, Mark Forensics and Security Research Group School of Computer Science Univeristy College Dublin Ireland Department of Computing and Mathematics South East Technological University Waterford Ireland
This paper investigates the effectiveness of colour-based descriptors in Content-Based Image Retrieval (CBIR) and examines the impact of various parameters on image matching accuracy. The aim is to improve image retri... 详细信息
来源: 评论
Forensic investigation of social networking applications
收藏 引用
Network security 2014年 第11期2014卷 9-16页
作者: Taylor, Mark Haggerty, John Gresty, David Almond, Peter Berry, Tom Liverpool John Moores University United Kingdom Nottingham Trent University United Kingdom Centre for Computer Security Audit Forensics and Education in the University of Greenwich United Kingdom School of Computing and Mathematical Sciences Liverpool John Moores University United Kingdom
Social networking applications such as Facebook, LinkedIn, MySpace and Twitter provide facilities including email, blogging, instant messaging and photo sharing for social and commercial exchange.1 There has been a ra... 详细信息
来源: 评论