咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 61 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 136 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 88 篇 工学
    • 64 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 23 篇 信息与通信工程
    • 20 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
  • 46 篇 理学
    • 27 篇 数学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 化学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 4 篇 attention mechan...
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing
  • 3 篇 condition monito...

机构

  • 10 篇 key laboratory o...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 the department o...
  • 4 篇 shandong fundame...
  • 4 篇 shandong provinc...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 state key labora...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...

作者

  • 11 篇 eui-nam huh
  • 7 篇 luo xiangyang
  • 6 篇 zhou jiantao
  • 6 篇 lu wei
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 4 篇 sheng ziqi
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you

语言

  • 114 篇 英文
  • 21 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
136 条 记 录,以下是131-140 订阅
排序:
A Grid-enabled framework of expertise search engine using Web-based online communities
A Grid-enabled framework of expertise search engine using We...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Mohammad Mehedi Hassan Pil-Woo Lee Eui-Nam Huh Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea KISTI Daejeon South Korea
Existing search engines like Google, Yahoo!, Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead, it is preferable to find and ask someone who... 详细信息
来源: 评论
Minimizing the Intrusion Detection Modules in Wireless Sensor networks
Minimizing the Intrusion Detection Modules in Wireless Senso...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Tran Hoang Hai Eui-Nam Huh Internet Computing and Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag... 详细信息
来源: 评论
A Resource Utilization Framework Using Partial State Information on Grid
A Resource Utilization Framework Using Partial State Informa...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Mohammad Mehedi Hassan Eui-Nam Huh Jai-Ho Oh Kyoung-Min Lee Ok-Hwan Byeon Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University Suwon South Korea Department of Environmental Atmospheric Sciences Pukyong National University South Korea KISTI Daejeon South Korea
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to ... 详细信息
来源: 评论
Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor networks
Optimal Selection and Activation of Intrusion Detection Agen...
收藏 引用
International Conference on Future Generation Communication and networking (FGCN)
作者: Tran Hoang Hai Eui Nam Huh Internet Computing and Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag... 详细信息
来源: 评论
Weighted one-way hash chain and its applications  3
收藏 引用
3rd International Workshop on Information security, ISW 2000
作者: Yen, Sung-Ming Zheng, Yuliang Department of Computer Science and Information Engineering National Central University Chung-Li320 Taiwan LINKS - Laboratory for Information and Network Security School of Network Computing Monash University McMahons Road FrankstonVIC3199 Australia
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment... 详细信息
来源: 评论
Trust and Privacy in Digital Business  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Simone Fischer-Hübner Stevel Furnell Costas Lambrinoudakis
This book presents the proceedings of the Third International Conference on Trust, Privacy and security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues f... 详细信息
来源: 评论