咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是971-980 订阅
排序:
Quantifying presence using calling patterns
Quantifying presence using calling patterns
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: Husain Husna Santi Phithakkitnukoon Enkh-Amgalan Baatarjav Ram Dantu Network Security Laboratory Department of Computer Science and Engineering University of North Texas Denton TX USA
Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), which will increase productivity of the p... 详细信息
来源: 评论
Behavior analysis of spam botnets
Behavior analysis of spam botnets
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: Husain Husna Santi Phithakkitnukoon Srikanth Palla Ram Dantu Network Security Laboratory Department of Computer Science and Engineering University of North Texas Denton TX USA
Compromised computers, known as bots, are the major source of spamming and their detection helps greatly improve control of unwanted traffic. In this work we investigate the behavior patterns of spammers based on thei... 详细信息
来源: 评论
Reliable Data Dissemination with Diversity Multi-Hop Protocol for Wireless Sensors network
Reliable Data Dissemination with Diversity Multi-Hop Protoco...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Salman Khan Eui-Nam Huh Imran Rao Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea Department of Computer Science and Software Engineering University of Melbourne Australia
The growing needs to support efficient data communications in wireless sensor networks (WSN) cannot be ignored. The resource constrained nature of WSN requires it to efficiently transmit the data with little consumpti... 详细信息
来源: 评论
Propagation Service Decision Method for Web Services Composition in u-Lifecare System
Propagation Service Decision Method for Web Services Composi...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Ki-moon Choi Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University Yongin si Gyeonggi South Korea
In Web environment, multiple Web service(WS)s may provide similar functionalities with different nonfunctional property values (e.g. different QoS metrics). Quality of service (QoS) metrics of WSs are critical factors... 详细信息
来源: 评论
An Efficient Grid Based Metadata Processing And Sharing Architecture For GEOSS
An Efficient Grid Based Metadata Processing And Sharing Arch...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University Yongin si Gyeonggi South Korea
The global earth observation system of systems (GEOSS) is being developed as a framework for existing and future Earth observation systems which will be comprehensive, coordinated and sustainable. Many earth observati... 详细信息
来源: 评论
A Grid-enabled framework of expertise search engine using Web-based online communities
A Grid-enabled framework of expertise search engine using We...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Mohammad Mehedi Hassan Pil-Woo Lee Eui-Nam Huh Department of Computer Engineering Internet Computing and Network Security Laboratory Kyung Hee University South Korea KISTI Daejeon South Korea
Existing search engines like Google, Yahoo!, Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead, it is preferable to find and ask someone who... 详细信息
来源: 评论
五谱值函数的构造
五谱值函数的构造
收藏 引用
中国密码学会2009年会
作者: Xie Min 谢敏 Li Juan 李娟 Zhang Feng-rong 张凤荣 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 Guangdo 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071 广东省信息安全技术重点实验室(广州大学)广州 510405 School of Electrical Engineering(Northwest University of Nationalities) Lanzhou 730030 西北民族大学电气工程学院 兰州 730030 Key laboratory of computer network and information security(Xidian University) Xi'an 710071 西安电子科技大学计算机网络与信息安全教育部重点实验室 西安 710071
在密码体制的构造中,布尔函数被广泛地应用,对分组密码中S-盒和流密码中组合生成器等的研究,实质上可归结为对布尔函数的分析.通过分析Bent函数的性质,利用级联的方法,构造了一类五谱值函数.该类函数没有非零线性结构、平衡、代数... 详细信息
来源: 评论
Experiences in building a multi-university testbed for research in multimedia communications
Experiences in building a multi-university testbed for resea...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Ram Dantu Henning Schulzrinne Paul Sroufe Network Security Laboratory Department of Computer Science & Engineering University of North Texas Denton TX USA Department of Computer Science Columbia University New York NY USA
The next generation Internet needs to support multimedia services such as voice/video over IP (VoIP) and IP-based television (IPTV) and media distribution. The goal of the project is to develop a testbed for understan... 详细信息
来源: 评论
Storage Requirements for Key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论