咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是421-430 订阅
排序:
Flexible security configuration for virtual machines
Flexible security configuration for virtual machines
收藏 引用
2nd ACM Workshop on computer security Architectures, CSAW'08, Co-located with the 15th ACM computer and Communications security Conference, CCS'08
作者: Rueda, Sandra Sreenivasan, Yogesh Jaeger, Trent Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802 United States
Virtualmachines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, mechanisms that offer controlled intera... 详细信息
来源: 评论
Minimizing the Intrusion Detection Modules in Wireless Sensor Networks
Minimizing the Intrusion Detection Modules in Wireless Senso...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Tran Hoang Hai Eui-Nam Huh Internet Computing and Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag... 详细信息
来源: 评论
Propagation Service Decision Method for Web Services Composition in u-Lifecare System
Propagation Service Decision Method for Web Services Composi...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Ki-moon Choi Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University Yongin si Gyeonggi South Korea
In Web environment, multiple Web service(WS)s may provide similar functionalities with different nonfunctional property values (e.g. different QoS metrics). Quality of service (QoS) metrics of WSs are critical factors... 详细信息
来源: 评论
An Efficient Grid Based Metadata Processing And Sharing Architecture For GEOSS
An Efficient Grid Based Metadata Processing And Sharing Arch...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University Yongin si Gyeonggi South Korea
The global earth observation system of systems (GEOSS) is being developed as a framework for existing and future Earth observation systems which will be comprehensive, coordinated and sustainable. Many earth observati... 详细信息
来源: 评论
Reliable Data Dissemination with Diversity Multi-Hop Protocol for Wireless Sensors Network
Reliable Data Dissemination with Diversity Multi-Hop Protoco...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Salman Khan Eui-Nam Huh Imran Rao Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea Department of Computer Science and Software Engineering University of Melbourne Australia
The growing needs to support efficient data communications in wireless sensor networks (WSN) cannot be ignored. The resource constrained nature of WSN requires it to efficiently transmit the data with little consumpti... 详细信息
来源: 评论
A Grid-enabled framework of expertise search engine using Web-based online communities
A Grid-enabled framework of expertise search engine using We...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Mohammad Mehedi Hassan Pil-Woo Lee Eui-Nam Huh Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea KISTI Daejeon South Korea
Existing search engines like Google, Yahoo!, Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead, it is preferable to find and ask someone who... 详细信息
来源: 评论
A Peer-to-Peer Resource Sharing Scheme Using Trusted computing Technology
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第5期13卷 523-527页
作者: CHEN Lu ZHANG Huanguo ZHANG Liqiang LI Song CAI Liang School of Computer Wuhan University/Key Laboratory ofAerospace Information Security and Trusted Computing of Ministryof Education Wuhan 430072 Hubei China State Key Laboratory of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Department of Information Security Information EngineeringUniversity Zhengzhou 450004 Henan China
Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mu... 详细信息
来源: 评论
Mitigating energy holes based on transmission range adjustment in wireless sensor networks  5
Mitigating energy holes based on transmission range adjustme...
收藏 引用
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, security and Robustness, QShine 2008
作者: Song, Chao Cao, Jiannong Liu, Ming Zheng, Yuan Gong, Haigang Chen, Guihai School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China Department of Computing Internet and Mobile Computing Laboratory Hong Kong Polytechnic University Hong Kong Hong Kong State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China
In a wireless sensor network (WSN), the energy hole problem is a key factor which affects the lifetime of the networks. In a WSN with circular multi-hop deployment (modeled as concentric coronas), sensors in one coron... 详细信息
来源: 评论
[ETCTR] Efficient Target Localization by Controlling the Transmission Range in Wireless Sensor Networks
[ETCTR] Efficient Target Localization by Controlling the Tra...
收藏 引用
International Conference on Networked computing and Advanced Information Management (NCM)
作者: Sajjad Hussain Chaudhary Ali Kashif Bashir Myong-Soon Park Internet Computing Laboratory Department of Computer Science and Engineering Korea University Seoul South Korea
The applications of sensor networks are getting critical and important particularly in strategic, applications such as corresponding target detection, surveillance, and target localization. To accomplish target detect... 详细信息
来源: 评论
PinUP: Pinning User Files to Known Applications
PinUP: Pinning User Files to Known Applications
收藏 引用
Annual computer security Applications Conference
作者: William Enck Patrick McDaniel Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering Pennsylvania State University USA
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the internet. Such applications are run with the user's full permissions. Because system prot... 详细信息
来源: 评论