咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是61-70 订阅
排序:
On developing deep learning models with particle swarm optimization in the presence of poisoning attacks  23
On developing deep learning models with particle swarm optim...
收藏 引用
23rd International Arab Conference on information Technology, ACIT 2022
作者: Maabreh, Majdi Darwish, Omar Karajeh, Ola Tashtoush, Yahya The Hashemite University Department of Computer Information Systems Zarqa Jordan Eastern Michigan University Information Security and Applied Computing Department MI United States Virginia Polytechnic Institute and State University Department of Computer Science VA United States Jordan University of Science and Technology Department of Computer Science Irbid Jordan
Deep learning (DL) has demonstrated several successes in a variety of fields, particularly in the era of big data. The process of training a deep learning model entails selecting the ideal learning parameters such as ... 详细信息
来源: 评论
A Glove CNN-Bilstm Sentiment Classification  18
A Glove CNN-Bilstm Sentiment Classification
收藏 引用
18th International Computer Conference on Wavelet Active Media Technology and information Processing, ICCWAMTIP 2021
作者: Atandoh, Peter Feng, Zhang Adu-Gyamfi, Daniel Leka, Habte Lejebo Atandoh, Paul Hakeem University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China University of Technology and Applied Sciences School of Computing Information Sciences Department of Cyber Security and Computer Engineering CK Tedam Navrongo Ghana Western Michigan University Department of Statistics KalamazooMI49008-5278 United States
Reviewing products online has become an increasingly popular way for consumers to voice their opinions and feelings about a product or service. Analyzing this Big data of online reviews would help to discern and extra... 详细信息
来源: 评论
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times  5
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
5th International Conference on Intelligent computing, Communication, Networking and Services, ICCNS 2024
作者: Alajlouni, Moayyad Tashtoush, Yahya Dossari, Saud Alhajaj Al. Darwish, Omar Jordan University of Science and Technology Department of Computer Science Irbid Jordan Prince Sattam bin Abdulaziz University Department of Electrical Engineering Wadi Addwasir Saudi Arabia Eastern Michigan University Information Security and Applied Computing Department YpsilantiMI48197 United States
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论
Analyzing darknet traffic through machine learning and neucube spiking neural networks
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 265-283页
作者: Iman Akour Mohammad Alauthman Khalid M.O.Nahar Ammar Almomani Brij B.Gupta Information Systems Department College of Computing&InformaticsUniversity of SharjahSharjahUnited Arab Emirates Department of Information Security Faculty of Information TechnologyUniversity of PetraAmman 11196Jordan the Faculty of Computer Studies Arab Open UniversityRiyadh 11681Saudi Arabia Department of Information Technology Al-Huson University CollegeAl-Balqa Applied UniversityIrbid 19117Jordan the Department of Computer Information Science Higher Colleges of TechnologySharjahUnited Arab Emirates the Department of Computer Science and Information Engineering Asia UniversityTaichung 413ChinaSymbiosis Centre for Information TechnologySymbiosis International(Deemed University)Pune 412115India Centre of Inter-disciplinary Research&Innovation University of Petroleum and Energy StudiesDehradun 248007India
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication *** detection of clandestine darknet traffic is therefore critical yet immensely *** research demonstrat... 详细信息
来源: 评论
Deep web integrated systems: Current achievements and open issues
Deep web integrated systems: Current achievements and open i...
收藏 引用
13th International Conference on information Integration and Web-Based Applications and Services, iiWAS2011
作者: El-Gamil, Boutros R. Winiwarter, Werner Božić, Bojan Wahl, Harald University of Vienna Research Group Data Analytics and Computing Universitätsstraße 5 1010 Vienna Austria Austrian Institute of Technology Dept. of Safety and Security Donau-City-Straße 1 Vienna Austria University of Applied Sciences Technikum Wien Dept. of Information Engineering and Security Höchstädtplatz 5 1200 Vienna Austria
The problem of extracting data that resides in the deep Web has become the center of many research efforts in the recent few years. The challenges in this research area are spanning from online databases discovery and... 详细信息
来源: 评论
EEG Source Localization Using Spatio-Temporal Neural Network
收藏 引用
China Communications 2019年 第7期16卷 131-143页
作者: Song Cui Lijuan Duan Bei Gong Yuanhua Qiao Fan Xu Juncheng Chen Changming Wang Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China College of Applied Sciences Beijing University of Technology Beijing 100124 China The National Clinical Research Center for Mental Disorders & Beijing Key Laboratory of Mental Disorders Beijing Anding Hospital Capital Medical University Beijing 100088 China Advanced Innovation Center for Human Brain Protection Capital Medical University Beijing 100069 China
Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is ... 详细信息
来源: 评论
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2499-2517页
作者: Ammar Almomani Iman Akour Ahmed M.Manasrah Omar Almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa School of Computing Skyline University CollegeUniversity City of SharjahP.O.Box 1797SharjahUnited Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Information Systems Department College of Computing&InformaticsUniversity of SharjahUnited Arab Emirates Comp.Info Sciences(CIS)Division Higher Colleges of TechnologySharjahUnited Arab Emirates Computer Sciences Department Yarmouk UniversityIrbidJordan Computer Network and Information Systems Department The World Islamic Sciences and Education UniversityAmman11947Jordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network ***,executed through network packets,pose a significant challenge for firewalls t... 详细信息
来源: 评论
A Review of Lightweight security and Privacy for Resource-Constrained IoT Devices
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
A Lightweight Hardware-based Authentication for Secure Smart Grid Energy Storage Units
A Lightweight Hardware-based Authentication for Secure Smart...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Fathi Amsaad Selçuk Köse Information Security and Applied Computing Eastern Michigan University Ypsilanti Michigan Electrical and Computer Engineering University of Rochester Rochester New York
Next generation smart power grid offers advanced features to enhance the traditional power grid by enabling faster and more user-friendly two-way communications between utility centers and the consumers for a faster, ... 详细信息
来源: 评论
Pair Data Division Algorithm For Handling Data Classification
Pair Data Division Algorithm For Handling Data Classificatio...
收藏 引用
International Conference on Social Networks Analysis, Management and security (SNAMS)
作者: Abdul Razaque A. Kanapina M. Sailaubek D. Tsoy Z. Turganov Muder Almiani Fathi Amsaad Mohammad Adnan Almahamed IITU Kazakhstan Al-Hussein Bin Talal University Jordan School of Information Security and Applied Computing Eastern Michigan University USA
Data heterogeneity creates the complexity for understanding the different domains. Most of domains require sophisticated algorithm to understand the complexity. To handle the data heterogeneity problem, several method... 详细信息
来源: 评论