咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 33 篇 期刊文献

馆藏范围

  • 98 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 39 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 9 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 电气工程
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
  • 30 篇 理学
    • 12 篇 数学
    • 8 篇 物理学
    • 4 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 海洋科学
  • 22 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 10 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 7 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 8 篇 法学
    • 8 篇 社会学
    • 2 篇 法学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 2 篇 军事学

主题

  • 4 篇 regulation
  • 4 篇 optimization
  • 3 篇 telemedicine
  • 3 篇 computer archite...
  • 3 篇 big data
  • 3 篇 law
  • 3 篇 quality of servi...
  • 3 篇 decision making
  • 3 篇 cloud computing
  • 3 篇 ip networks
  • 3 篇 vehicles
  • 3 篇 cryptography
  • 3 篇 multiobjective o...
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 intrusion detect...
  • 2 篇 computer network...
  • 2 篇 data security
  • 2 篇 dicom
  • 2 篇 dictionaries

机构

  • 5 篇 graduate program...
  • 5 篇 state intelligen...
  • 5 篇 department of el...
  • 5 篇 universitas kris...
  • 5 篇 medical intellig...
  • 4 篇 post graduate pr...
  • 3 篇 department of ph...
  • 3 篇 health managemen...
  • 3 篇 center of comple...
  • 3 篇 department of in...
  • 3 篇 sampoerna univer...
  • 3 篇 information syst...
  • 3 篇 department of ci...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of in...
  • 3 篇 department of ac...
  • 3 篇 faculty of indus...
  • 3 篇 departement of: ...
  • 3 篇 department of in...

作者

  • 7 篇 mantoro teddy
  • 7 篇 teddy mantoro
  • 4 篇 taufik djatna
  • 3 篇 w sardjono
  • 3 篇 susandi armi
  • 3 篇 armi susandi
  • 3 篇 sardjono w.
  • 2 篇 abbafati cristia...
  • 2 篇 bärnighausen til...
  • 2 篇 muammar khaddafi
  • 2 篇 jorge werner
  • 2 篇 biondi antonio
  • 2 篇 béjot yannick
  • 2 篇 bhattacharyya kr...
  • 2 篇 alahdab fares
  • 2 篇 alvis-guzman nel...
  • 2 篇 nurmawati
  • 2 篇 adekanmbi victor
  • 2 篇 lusi dwi putri
  • 2 篇 dahlan abdullah

语言

  • 96 篇 英文
  • 2 篇 中文
检索条件"机构=Post-Graduate Program in Computer Science - PROCC"
98 条 记 录,以下是1-10 订阅
排序:
FPGA implementation of low cost and low power chaotic encryption scheme based on a discrete-space chaotic map
收藏 引用
Multimedia Tools and Applications 2025年 1-22页
作者: Moreira Bezerra, João Inácio Machado, Gustavo Iankowski Soares, Rafael Valduga de Almeida Camargo, Vinícius Molter, Alexandre Post Graduate Program in Computer Science Universidade Federal de Pelotas Rio Grande do Sul Pelotas96010610 Brazil Graduate Program in Computer Engineering Universidade Federal de Pelotas Rio Grande do Sul Pelotas96010610 Brazil Post Graduate Program in Mathematical Modeling Universidade Federal de Pelotas Rio Grande do Sul Capão do Leão96160000 Brazil
The exponential growth of the number of devices connected to the Internet and the use of IoT applications increases the amount of data exchange over public channels in low-cost and low-power embedded systems. Images a... 详细信息
来源: 评论
Preventing Cyber Crime in Electronic Medical Records Using Encryption Data  1
Preventing Cyber Crime in Electronic Medical Records Using E...
收藏 引用
1st International Conference on Technology, Engineering, and Computing Applications, ICTECA 2023
作者: Budiman Mantoro, Teddy Ratmono, Barito Mulyo Persadha, Pratama Dahlian National Intelligence College Post Graduate Program of Medical Intelligence Bogor Indonesia Sampoerna University Department of Computer Science Jakarta Indonesia
With the advancement of technology, information systems have become increasingly necessary in almost all areas, including healthcare. One of the technologies used to facilitate this progress is electronic medical reco... 详细信息
来源: 评论
Disaster recovery plan implementation evaluation model at the corporation  7
Disaster recovery plan implementation evaluation model at th...
收藏 引用
7th Information Systems International Conference, ISICO 2023
作者: Sardjono, Wahyu Perdana, Widhilaga Gia Putra, Gustian Rama Information Systems Management Department BINUS Graduate Program - Master of Information Systems Management Bina Nusantara University Jakarta11480 Indonesia Post Graduate Program of Management Science State University of Jakarta Jl. R.Mangun Muka Raya No.11 Jakarta Timur Jakarta13220 Indonesia Computer Science Study Program Faculty of Mathematics & Natural Sciences Pakuan University Bogor Indonesia
The application of information technology in addition to making internal business processes more effective and efficient, is also to improve customer service. This role is important for companies to maintain the susta... 详细信息
来源: 评论
Blockchain-Based Chain of Custody for Digital Evidence with Hyperledger Fabric
Blockchain-Based Chain of Custody for Digital Evidence with ...
收藏 引用
International Conference on Information Networking
作者: Leandro Loffi Gerson Luiz Camillo Carla Merkle Westphall Carlos Becker Westphall Department of Post-Graduate Program in Computer Science Federal University of Santa Catarina (UFSC) Florianópolis SC Brazil
The increasing presence of digital evidence in legal, criminal, and civil cases requires adaptations to traditional chain-of-custody processes to ensure the integrity of this evidence. This work proposes the use of bl... 详细信息
来源: 评论
Applications of Artificial Intelligence and Big Data for Strengthening the Role of Intelligence in Human Security  8
Applications of Artificial Intelligence and Big Data for Str...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Mubarok, Ahmad Shahrul Susandi, Armi Mantoro, Teddy State Intelligence College Medical Intelligence Post-Graduate Program Bogor Indonesia Sampoerna University Media-Tech Lab Departement of Computer Science Jakarta Indonesia
The state, through the government, should ensure national security and stability through the policies taken. For this reason, fast and accurate information and data are needed to form the basis for policymaking. Intel... 详细信息
来源: 评论
Private Data Protection as Countermeasure Against Misuses of Medical Intelligent Technology Data: A Literature Study  8
Private Data Protection as Countermeasure Against Misuses of...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Praseptiadi Dahlian Persadha, Pratama Susandi, Armi Mantoro, Teddy State Intelligence College Medical Intelligence Post-graduate Program Bogor Indonesia Sampoema University Media-Tech Lab Department of Computer Science Jakarta Indonesia
Medical Technologies develop along with the development of the Industrial Revolution 4.0 (I.R. 4.0). In I.R. 4.0, a collaborative ecosystem is formed between cyber technology and automation technology to be able to cr... 详细信息
来源: 评论
Multi-agent Architecture for Passive Rootkit Detection with Data Enrichment
Multi-agent Architecture for Passive Rootkit Detection with...
收藏 引用
International Conference on computer science, Electronics, and Industrial Engineering, CSEI 2022
作者: Trinks, Maickel Gondim, João Albuquerque, Robson Professional Post-Graduate Program in Electrical Engineering - PPEE - Department of Electrical Engineering University of Brasília DF Brasília Brazil Department of Computer Science Universidade de Brasília DF Brasília Brazil
The added value of the information transmitted in a cybernetic environment has resulted in a sophisticated malicious actions scenario aimed at data exfiltration. In situations with advanced actors, like APTs, such act... 详细信息
来源: 评论
Analysis of the Cyber Attacks in Indonesia's Health Sector in Industry 4.0 Era  8
Analysis of the Cyber Attacks in Indonesia's Health Sector i...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Hidayat, Arif Mantoro, Teddy Susandi, Armi Indonesian State Intelligence College Medical Intelligence Post-Graduate Program Bogor Indonesia Sampoema University Media-Tech Lab Department of Computer Science Jakarta Indonesia
At this time the world has undergone considerable changes, where the world has entered the era of the industrial revolution 4.0. With these changes, there are many positive impacts or opportunities that can support hu... 详细信息
来源: 评论
Integration of Government Regulations to Anticipate the Threat of Terrorism with Radioactive and Nuclear Technology  8
Integration of Government Regulations to Anticipate the Thre...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Agustina, Mega Wijiyanti, Rika Mantoro, Teddy State Intelligence College Medical Intelligence Post-graduate Program Bogor Indonesia Sampoerna University and State Intelligence College Media-Tech Lab Department of Computer Science Jakarta Indonesia
The development of science and technology is currently experiencing rapid progress, starting in the fields of energy, oil, non-destructive testing, health, agriculture, and other fields. The use of radioactive substan... 详细信息
来源: 评论
Patient Data Security in Telemedicine Services from Data Misuse in Health Practice  8
Patient Data Security in Telemedicine Services from Data Mis...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Yuninda, Sinka Puji Aga Pasma, Satriani Mantoro, Teddy State Intelligence College Medical Intelligence Post-graduate Program Bogor Indonesia Sampoerna University and State Intelligence College Media-Tech Lab Department of Computer Science Jakarta Indonesia
Misuse of a person's data can be found anywhere because of a lack of knowledge about how to manage data and secure it properly. The rapid development of information technology, creates various activities easily, i... 详细信息
来源: 评论