咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是121-130 订阅
排序:
From SMOG to Fog: A security perspective
From SMOG to Fog: A security perspective
收藏 引用
International Conference on Fog and Mobile Edge Computing (FMEC)
作者: Ruben Rios Rodrigo Roman Jose A. Onieva Javier Lopez Network Information and Computer Security (NICS) Lab Universidad de Málaga
Cloud computing has some major limitations that hinder its application to some specific scenarios (e.g., Industrial IoT and remote surgery) where there are particularly stringent requirements, such as extremely low la... 详细信息
来源: 评论
Cooperative secure transmission by exploiting social ties in random networks
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Hui-Ming Xu, Yiming Huang, Ke-Wen Han, Zhu Tsiftsis, Theodoros A. School of Electronics and Information Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi710049 China Department of Electrical and Computer Engineering University of Houston HoustonTX77004 United States School of Engineering Nazarbayev University Astana010000 Kazakhstan
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many... 详细信息
来源: 评论
Topology and survivability analysis for flight flow networks: Case studies of three China airline companies  11
Topology and survivability analysis for flight flow networks...
收藏 引用
11th International Conference on Ubiquitous information Management and Communication, IMCOM 2017
作者: Gao, Xiaofeng Dang, Yaru Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab of Scalable Computing and Systems Dept. of Computer Science Shanghai Jiao Tong University Shanghai China Civil Aviation SandT Educational Evaluation Research Center Civil Aviation University of China Tianjin China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
In this paper we study the survivability feature of airline networks. To measure survivability, we comprehensively consider the network structure measures such as degree distribution, average path length, clustering c... 详细信息
来源: 评论
Automatic network Policy Change on the Basis of Quality of Experience (QoE)
收藏 引用
Procedia computer Science 2017年 107卷 657-659页
作者: Asif Ali Laghari Hui He Muhammad Ibrahim Salahuddin Shaikh Computer Network & Security Lab School of Computer Science & Technology Harbin Institute of Technology China Harbin China Department of Information Technology QUEST Nawabshah Sindh Pakistan
network policies are rules and regulations, limitations and settings that allow user to get services from service providers, and policies are the part of SLA document. The main problem of SLA termination between user ... 详细信息
来源: 评论
Frequency synchronization for uplink massive MIMO with adaptive MUI suppression in angle-domain
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Yinghao Zhang, Weile Gao, Feifei Li, Geoffrey Ye MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an Shaanxi710049 China State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing100084 China Department of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States
In this paper, we develop a novel angle-domain adaptive filtering (ADAF)-based frequency synchronization method for the uplink of a massive multiple-input multiple-output (MIMO) multiuser network, which is applicable ... 详细信息
来源: 评论
WLAN Based Position Estimation System Using Classification Fuzzy K-Nearest Neighbor (FK-NN)
收藏 引用
IOP Conference Series: Earth and Environmental Science 2019年 第1期248卷
作者: R F Malik Mardiah A Farissi D Stiawan R Zulfahmi M R Ahmad A S Khirbeet Communication Network and Information Security Research Lab Faculty of Computer Science Universitas Sriwijaya Jalan Srijaya Negara Bukit Besar Bukit Lama Ilir Bar. I Kota Palembang Sumatera Selatan 30128 - Indonesia Faculty of Electronics and Computer Engineering Universiti Teknikal Malaysia Melaka Jalan Hang Tuah Jaya 76100 Durian Tunggal Melaka Malaysia
Increasing the number of public hotspots using Wi-Fi technology is one of opportunity to gain advantage for proposing many new technologies. One of emerging technology is an estimation system to locate the object/pers...
来源: 评论
The Indoor Positioning System Using Fingerprint Method Based Deep Neural network
收藏 引用
IOP Conference Series: Earth and Environmental Science 2019年 第1期248卷
作者: R F Malik R Gustifa A Farissi D Stiawan H Ubaya M R Ahmad A S Khirbeet Communication Network and Information Security Research Lab Faculty of Computer Science Universitas Sriwijaya Jalan Srijaya Negara Bukit Besar Bukit Lama Ilir Bar. I Palembang Sumatera Selatan 30128 - Indonesia Faculty of Electronics and Computer Engineering Universiti Teknikal Malaysia Melaka Jalan Hang Tuah Jaya 76100 Durian Tunggal Melaka - Malaysia
Highly dynamic indoor environments being one of the challenge in the Indoor Positioning System (IPS). Collecting the Received Signal Strength (RSS) value from every WiFi access point known fingerprint method is presen...
来源: 评论
Study on Applications of Eye Tracking in Different Fields
Study on Applications of Eye Tracking in Different Fields
收藏 引用
2017 2nd International Conference on Communications, information Management and network security (CIMNS2017)
作者: Min KE Bo-gang LIN Yang YANG College of Mathematics and Computer Science Fuzhou University Key Lab of Information Security of Network System in Fujian Province Institute for Web Science and Technologies Universit?t Koblenz-Landau
The arising technology eye tracking has been blooming not only in the medical field but also in the field of computer science. There are various usages of eye tracking that range from human study, over usability of de... 详细信息
来源: 评论
Achieving Flow-Oriented Reliable Services in Cloud Computing
Achieving Flow-Oriented Reliable Services in Cloud Computing
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Yunhao Mu Qin Liu Junhai Zhou Kang Xie Guojun Wang College of Computer Science and Electronic Engineering Hunan University P.R. China Ministry of Public Security Key Lab of Information Network Security P.R. China School of Computer Science and Educational Software Guangzhou University P.R. China
In cloud computing, a data owner outsources a huge dataset to cloud servers, and authorizes many clients to retrieve data of interest anytime and anywhere. Data outsourcing is helpful to lessen the burden on local dat... 详细信息
来源: 评论
Constructing a Science of Cyber-Resilience for Military Systems
Constructing a Science of Cyber-Resilience for Military Syst...
收藏 引用
2017 NATO IST-153/RWS-21 Workshop on Cyber Resilience, IST-153 2017
作者: Alexeev, Alexander Henshel, Diane S. Levitt, Karl McDaniel, Patrick Rivera, Brian Templeton, Steven Weisman, Mike Data Analysis and Modeling Indiana University School of Public and Environmental Affairs 1315 E 10th Street BlooomingtonIN47405 Indiana University School of Public and Environmental Affairs 1315 E 10th Street BloomingtonIN47405 Computer Science College of Engineering University of California Davis 1 Shields Ave. DavisCA05616 School of Electrical Engineering and Computer Science Pennsylvania State University Information Sciences and Technology Building University ParkPA16802-6823 Network Science Division Tactical Network Assurance Branch U.S. Army Research Laboratory 2800 Powder Mill Road AdelphiMD20783 Computer Security Research Lab Department of Computer Science University of California Davis One Shields Avenue DavisCA95616 Network Science Division Network Security Branch U.S. Army Research Laboratory ICF International 2800 Powder Mill Road AdelphiMD20783
来源: 评论