咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是441-450 订阅
排序:
Protecting users from "themselves"
Protecting users from "themselves"
收藏 引用
1st ACM computer security Architectures Workshop, CSAW'07, held in association with the 14th ACM computer and Communications security Conference, CCS'07
作者: Enck, William Rueda, Sandra Schiffman, Joshua Sreenivasan, Yogesh St. Clair, Luke Jaeger, Trent McDaniel, Patrick Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802 United States
computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each user has many devices with their own stor... 详细信息
来源: 评论
Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks
Optimal Selection and Activation of Intrusion Detection Agen...
收藏 引用
International Conference on Future Generation Communication and Networking (FGCN)
作者: Tran Hoang Hai Eui Nam Huh Internet Computing and Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag... 详细信息
来源: 评论
An energy-aware protocol for data gathering applications in wireless sensor networks
An energy-aware protocol for data gathering applications in ...
收藏 引用
IEEE International Conference on Communications (ICC 2007)
作者: Liu, Ming Zheng, Yuan Cao, Jiannong Chen, Guihai Chen, Lijun Gong, Haigang School of Computer Science and Engineering University of Electronic and Technology of China China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
A New Architecture of Sensitive File Management Based on Dual-Core and EFI
A New Architecture of Sensitive File Management Based on Dua...
收藏 引用
International IEEE Conference on Signal-Image Technologies and internet-Based System
作者: Zijian Deng Xuejia Lai Laboratory of Information Security and National Computing Grid Southwest Jiaotong University Chengdu Sichuan China Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China
How to protect the sensitive information from unauthorized disclosure is one of the problems in computer security. In this paper we present a new method for preventing the sensitive file from unauthorized disclosure, ... 详细信息
来源: 评论
An Energy-Aware Protocol for Data Gathering Applications in Wireless Sensor Networks
An Energy-Aware Protocol for Data Gathering Applications in ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: M. Liu Y. Zheng J. Cao G. Chen L. Chen H. Gong School of Computer Science and Engineering University of Electronic Science and Technology China Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Hong Kong China State Key Laboratory for Novel Software Technology Nanjing University China
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ... 详细信息
来源: 评论
A pairing-based signcryption scheme using self-certified public keys
收藏 引用
International Journal of computers and Applications 2007年 第3期29卷 278-282页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener... 详细信息
来源: 评论
Non-Invasive Methods for Host Certification
Non-Invasive Methods for Host Certification
收藏 引用
International Conference on security and Privacy for Emerging Areas in Communications Networks (SecureComm)
作者: Patrick Traynor Michael Chien Scott Weaver Boniface Hicks Patrick McDaniel Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering Pennsylvania State University USA
Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks.... 详细信息
来源: 评论
Exploiting open functionality in SMS-capable cellular networks  05
Exploiting open functionality in SMS-capable cellular networ...
收藏 引用
CCS 2005 - 12th ACM Conference on computer and Communications security
作者: Enck, William Traynor, Patrick McDaniel, Patrick Porta, Thomas La Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University University Park PA 16802
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text messages to the vast majority of wireless... 详细信息
来源: 评论
TARP: ticket-based address resolution protocol
TARP: ticket-based address resolution protocol
收藏 引用
Annual computer security Applications Conference
作者: W. Lootah W. Enck P. McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University USA
IP networks fundamentally rely on the address resolution protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based impersonation, man-in-the-middle, or DoS attac... 详细信息
来源: 评论
Exception handling in distributed workflow systems using mobile agents
Exception handling in distributed workflow systems using mob...
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Jiannong Cao Jin Yang Wai Ting Chan C. Xu Internet and Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong China Cluster and Internet Computing Laboratory Department of Electrical and Computer Engineering Wayne State University Detroit MI USA
Workflow management systems (WfMSs) are software systems used to automate, coordinate and streamline business processes of organizations. Most existing research on WfMSs has been focused on workflows based on well-str... 详细信息
来源: 评论