咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 62 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 209 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 95 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 23 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 15 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 7 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 machine learning
  • 9 篇 deep learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...
  • 4 篇 jordan universit...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 198 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
209 条 记 录,以下是1-10 订阅
排序:
The Emergent Role of Artificial Intelligence as Tool in Conducting Academic Research  16
The Emergent Role of Artificial Intelligence as Tool in Cond...
收藏 引用
16th International Conference on Society and information Technologies, ICSIT 2025
作者: Ferdousi, Bilquis School of Information Security and Applied Computing College of Engineering and Technology Eastern Michigan University YpsilantiMI United States
Academic and non-academic research institutes are the two key global sectors that are accomplishing the research agenda. This paper focuses on the implications of using AI tools in academic research. Academic institut... 详细信息
来源: 评论
Detecting Phishing Websites Based on Machine Learning Techniques  1st
Detecting Phishing Websites Based on Machine Learning Techni...
收藏 引用
1st International Conference on Advances in computing Research, ACR’23
作者: Veach, Alexander Abualkibash, Munther School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
Phishing is one of the most common threats to cybersecurity in the modern world. It is to this regard many look to emergent technologies such as artificial intelligence and machine learning as preventative measures. B... 详细信息
来源: 评论
A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence  1st
A Survey on Drone Cybersecurity and the Application of Machi...
收藏 引用
1st International Conference on Advances in computing Research, ACR’23
作者: Walatkiewicz, Jonathan Darwish, Omar Information Security and Applied Computing Eastern Michigan University 900 Oakwood St YpsilantiMI48197 United States
Recreational and commercial drones are becoming more common in the United States and globally. As of 2020, recreational drones registered with the Federal Aviation Association (FAA) peaked at 1,195,722 (Federal Aviati... 详细信息
来源: 评论
A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Oplà Device in IoT Environment  5
A Classifier to Detect Number of Machines Performing DoS Att...
收藏 引用
5th International Conference on Advanced Communication Technologies and Networking, CommNet 2022
作者: Al-Maani, Mahmoud Frisbie, Gayle Shippy, Frederick Tiseo, Mario Darwish, Omar Abualkibash, Munther Eastern Michigan University Information Security and Applied Computing YpsilantiMI United States
The use of Internet of Things (IoT) devices is on the rise as they enter our homes and businesses, from smart appliances to increased use in agriculture, health care, and manufacturing. These IoT devices rely on their... 详细信息
来源: 评论
information-Centric IoT-Based Smart Farming with Dynamic Data Optimization
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3865-3880页
作者: Souvik Pal Hannah VijayKumar D.Akila N.Z.Jhanjhi Omar A.Darwish Fathi Amsaad Department of Computer Science and Engineering Sister Nivedita UniversityKolkataIndia Post Doctoral Researcher Sambalpur UniversitySambalpurIndia Department of Computer Science Anna Adarsh College for WomenChennaiIndia Department of Information Technology Vels Institute of ScienceTechnology and Advanced StudiesChennaiIndia School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubang Jaya47500SelangorMalaysia Department of Information Security and Applied Computing Eastern Michigan UniversityUSA School of Information Security and Applied Computing Eastern Michigan UniversityUSA
Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies,including big data,the cloud,and the Internet of Things(IoT).Ma... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Applying Digital Technology in Writing Intensive Class in Cyber security and information Technology Programs Identifying Technical and Psychological Issues  26
Applying Digital Technology in Writing Intensive Class in Cy...
收藏 引用
26th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2022
作者: Ferdousi, Bilquis School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
This paper studies how to improve students’ technical and academic writing skills by applying digital technology, and identifying the effect of technical and psychological factors. The specific purposes of the study ... 详细信息
来源: 评论
A Communication-efficient Conjunctive Query Scheme under Local Differential Privacy
A Communication-efficient Conjunctive Query Scheme under Loc...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Ellen Z. Guan, Yunguo Lu, Rongxing Zhang, Harry University of New Brunswick Faculty of Computer Science FrederictonE3B5A3 Canada Eastern Michigan University School of Information Security and Applied Computing YpsilantiMI48197 United States
Crowdsourcing has become a widely used method for data collection and analysis, yet its privacy remains a challenge. In this paper, we present a new efficient and privacy-preserving conjunctive query scheme for crowds... 详细信息
来源: 评论
Hierarchical certification of nonclassical network correlations
收藏 引用
Physical Review A 2024年 第2期110卷 022617页
作者: Ming-Xing Luo Xue Yang Alejandro Pozas-Kerstjens Information Security and National Computing Grid Laboratory CAS Center for Excellence in Quantum Information and Quantum Physics Hefei 230026 China Group of Applied Physics 8200 Schaffhausen Switzerland (
With the increased availability of quantum technological devices, it becomes more important to have tools to guarantee their correct nonclassical behavior. This is especially important for quantum networks, which cons... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论