咨询与建议

限定检索结果

文献类型

  • 135 篇 期刊文献
  • 127 篇 会议

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 理学
    • 75 篇 物理学
    • 19 篇 数学
    • 16 篇 生物学
    • 6 篇 大气科学
    • 6 篇 统计学(可授理学、...
    • 4 篇 天文学
  • 112 篇 工学
    • 70 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 18 篇 控制科学与工程
    • 17 篇 电气工程
    • 17 篇 信息与通信工程
    • 15 篇 生物工程
    • 13 篇 动力工程及工程热...
    • 10 篇 材料科学与工程(可...
    • 9 篇 电子科学与技术(可...
    • 9 篇 核科学与技术
    • 7 篇 机械工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
  • 31 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 12 篇 法学
    • 12 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 农学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 9 篇 machine learning
  • 7 篇 information tech...
  • 7 篇 higgs bosons
  • 7 篇 energy efficienc...
  • 6 篇 task analysis
  • 6 篇 supersymmetric m...
  • 6 篇 optimization
  • 6 篇 computer crime
  • 6 篇 wireless sensor ...
  • 6 篇 visualization
  • 6 篇 security
  • 6 篇 virtual reality
  • 6 篇 particle data an...
  • 5 篇 systematics
  • 5 篇 smart grids
  • 5 篇 buildings
  • 5 篇 search engines
  • 5 篇 supersymmetry
  • 5 篇 hadron colliders
  • 5 篇 top quark

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 39 篇 department of ph...
  • 39 篇 physics departme...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 259 篇 英文
  • 3 篇 其他
检索条件"机构=Institute of Informatics and Computing in Energy"
262 条 记 录,以下是61-70 订阅
排序:
Description for Smart Grid: Towards the Ontological Approach
Description for Smart Grid: Towards the Ontological Approach
收藏 引用
International Conference on Information Technology and Multimedia (ICIM)
作者: Alicia Tang Yee Chong Moamin A Mahmoud Fung-Cheng Lim Hairoladenan Kasim Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia College of Computing and Informatics Universiti Tenaga Nasional Malaysia
Smart grids facilitate the use of distributed and renewable resources on the supply side and providing consumers with a range of tailored services on the consumption side. The introduction of energy smart grid in Mala... 详细信息
来源: 评论
Mobile Application: Mobile Assistance for Visually Impaired People - Speech Interface System (SIS)
Mobile Application: Mobile Assistance for Visually Impaired ...
收藏 引用
International Conference on Information Technology and Multimedia (ICIM)
作者: Abdul Majid Norkhalid Masyura Ahmad Faudzi Azimah Abdul Ghapar Fiza Abdul Rahim College of Computing and Informatics Universiti Tenaga Nasional Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia
The evolution of technology has been made to bring the most benefits to human-being on communication and to facilitate their day-to-day activities. Technologies contribution, such as mobile application, has been prove... 详细信息
来源: 评论
Towards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Review  8
Towards SCADA Threat Intelligence based on Intrusion Detecti...
收藏 引用
8th International Conference on Information Technology and Multimedia, ICIMU 2020
作者: Qassim, Qais Saif Jamil, Norziana Mahdi, Mohammed Najah Abdul Rahim, Azril Azam Ibri College of Technology Ibri Sultanate of Oman Oman Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Selangor Malaysia Tenaga Nasional Berhad Kuala Lumpur Malaysia
Securing and protecting Supervisory Control and Data Acquisition (SCADA) systems have been an active topic of research for the past decades due to the catastrophic and disastrous consequences when these systems are br... 详细信息
来源: 评论
A Survey on Deception Techniques for Securing Web Application
A Survey on Deception Techniques for Securing Web Applicatio...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: A.I Mohd Efendi Z. Ibrahim M.N Ahmad Zawawi F. Abdul Rahim N.A Mohamad Pahri A. Ismail College of Computing & Informatics Universiti Tenaga Nasional 43000 Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia College of Computing & Informatics Universiti Tenaga Nasional Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional 43000 Malaysia College of Computing & Informatics Universiti Tenaga Nasional 43000 Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional 43000 Malaysia ASK-Pentest Menara Keck Seng Kuala Lumpur Malaysia
Many web applications are developed to handle important and critical tasks, which may attract a large number of attackers. With various types of attacks, there is no finite solution to mitigate it's all. Deception... 详细信息
来源: 评论
A Dynamical Behavior Measurement Algorithm for Smart Meter Data: An Analytical Study
A Dynamical Behavior Measurement Algorithm for Smart Meter D...
收藏 引用
IEEE Conference on Application, Information and Network Security (AINS)
作者: Abbas M. Al-Ghaili Hasventhran Baskaran Zul-Azri Ibrahim Fiza Abdul Rahim Syazwani Arissa Shah Hairi Institute of Informatics and Computing in Energy (IICE) Universiti Tenaga Nasional (UNITEN) Kajang Malaysia Institute of Informatics and Computing in Energy (IICE) & College of Computing & Informatics (CCI) Universiti Tenaga Nasional (UNITEN) Kajang Malaysia College of Computing & Informatics (CCI) Universiti Tenaga Nasional (UNITEN) Kajang Malaysia
Smart Meter Data (SMD) has been considered by many as sensitive due to many reasons. One of these reasons is the security issue possessed by the SMD. With the raising popularity of the smart meter deployment around th...
来源: 评论
A novel architecture to verify offline hand-written signatures using convolutional neural network
A novel architecture to verify offline hand-written signatur...
收藏 引用
2019 International Conference on Innovation and Intelligence for informatics, computing, and Technologies, 3ICT 2019
作者: Alkaabi, Sultan Yussof, Salman Almulla, Sameera Al-Khateeb, Haider Alabdulsalam, Abdulrahman A Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia College of Engineering and IT University of Dubai United Arab Emirates University of Wolverhampton United Kingdom Dept of Information Technology Oman
Hand-written signatures are marked on documents to establish legally binding evidence of identity and intent. However, they are prone to forgery, and the design of an accurate feature extractor to distinguish between ... 详细信息
来源: 评论
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems  3rd
A Short Review: Issues and Threats Pertaining the Security o...
收藏 引用
3rd International Conference on Advances in Cyber Security, ACeS 2021
作者: Qassim, Qais Saif Jamil, Norziana Mahdi, Mohammed Najah Cob, Zaihisma Che Rahim, Fiza Abd Sidek, Lariyah Mohd University of Technology and Applied Sciences – Ibri Ibri Oman College of Computing and Informatics Universiti Tenaga Nasional Kajang Malaysia School of Computing Universiti Teknologi Malaysia Skudai Malaysia Institute of Energy Infrastructure Universiti Tenaga Nasional Kajang Malaysia
SCADA systems are commonly used to track and manage utilities in vital national infrastructures including electricity generation and delivery, transportation networks, water supply and manufacturing, and manufacturing... 详细信息
来源: 评论
Comparative Analysis on Student's Interest in Cyber Security among Secondary School Students using CTF Platform
Comparative Analysis on Student's Interest in Cyber Security...
收藏 引用
International Conference on Information Technology and Multimedia (ICIM)
作者: Ahmad Dahaqin Bin Ibrahim Ahmad Haziq Ashrofie Hanafi Haikal Rokman Md Nabil Ahmad Zawawi Zul-Azri Ibrahim Fiza Abdul Rahim Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia
In recent years, we see more degradation in the quality of cyber security graduates, especially in terms of not meeting the employer's perspective. They lack a certain amount of skills to be competent enough for t... 详细信息
来源: 评论
Design and Development of a Serious Game for the Teaching of Requirements Elicitation and Analysis
Design and Development of a Serious Game for the Teaching of...
收藏 引用
IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE)
作者: Zailani Ibrahim Mei Chia Soo Mei Teng Soo Hazleen Aris College of Computing and Informatics Universiti Tenaga Nasional Kajang Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Kajang Malaysia Institute of Informatics and Computing Universiti Tenaga Nasional Kajang Malaysia
Requirements elicitation and analysis is one of the topics covered in Software Engineering, Requirements Engineering (RE) and other subjects belonging to the group, which are usually taught to the undergraduate comput... 详细信息
来源: 评论
Combining graphical and formal development of open distributed systems  3
收藏 引用
3rd International Conference on Integrated Formal Methods, IFM 2002
作者: Johnsen, Einar B. Zhang, Wenhui Owe, Olaf Aredo, Demissie B. Dept. of Informatics University of Oslo Norway Institute for Energy Technology Halden Norway BISS FB3 University of Bremen Germany Norwegian Computing Center Oslo Norway
A specification of a software system involves several aspects. Two essential aspects are convenience in specification and possibility for formal analysis. These aspects are, to some extent, exclusive. This paper descr... 详细信息
来源: 评论