咨询与建议

限定检索结果

文献类型

  • 891 篇 会议
  • 582 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 936 篇 工学
    • 617 篇 计算机科学与技术...
    • 489 篇 软件工程
    • 377 篇 信息与通信工程
    • 159 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 102 篇 控制科学与工程
    • 76 篇 生物工程
    • 66 篇 网络空间安全
    • 59 篇 仪器科学与技术
    • 53 篇 机械工程
    • 51 篇 安全科学与工程
    • 41 篇 光学工程
    • 32 篇 动力工程及工程热...
    • 31 篇 生物医学工程(可授...
    • 30 篇 化学工程与技术
    • 25 篇 材料科学与工程(可...
    • 22 篇 建筑学
  • 457 篇 理学
    • 241 篇 数学
    • 145 篇 物理学
    • 105 篇 统计学(可授理学、...
    • 82 篇 生物学
    • 46 篇 系统科学
    • 42 篇 化学
  • 203 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 50 篇 法学
    • 35 篇 社会学
  • 39 篇 医学
    • 36 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 24 篇 公共卫生与预防医...
  • 25 篇 军事学
  • 18 篇 经济学
  • 15 篇 农学
  • 6 篇 教育学
  • 5 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 45 篇 feature extracti...
  • 39 篇 deep learning
  • 37 篇 internet of thin...
  • 33 篇 security
  • 33 篇 protocols
  • 30 篇 simulation
  • 30 篇 accuracy
  • 29 篇 training
  • 27 篇 authentication
  • 27 篇 quantum cryptogr...
  • 25 篇 bandwidth
  • 25 篇 privacy
  • 24 篇 real-time system...
  • 24 篇 semantics
  • 22 篇 optimization
  • 21 篇 machine learning
  • 20 篇 blockchain
  • 19 篇 information secu...
  • 19 篇 data models
  • 18 篇 sensors

机构

  • 180 篇 science and tech...
  • 63 篇 department of in...
  • 43 篇 science and tech...
  • 37 篇 school of inform...
  • 36 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 state key labora...
  • 26 篇 purple mountain ...
  • 26 篇 department of in...
  • 22 篇 department of in...
  • 21 篇 school of inform...
  • 21 篇 school of comput...
  • 21 篇 school of inform...
  • 19 篇 state key labora...
  • 19 篇 school of cyber ...
  • 18 篇 hubei key labora...
  • 18 篇 school of comput...
  • 18 篇 school of cyber ...
  • 17 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 23 篇 li yang
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 21 篇 kralevska katina
  • 20 篇 yu song
  • 20 篇 yang jie
  • 19 篇 xiaoniu yang
  • 18 篇 lin jia-chun
  • 17 篇 lee ming-chang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 16 篇 jiang yuming
  • 15 篇 bingjie xu
  • 15 篇 wang heng
  • 14 篇 zhang leo yu
  • 14 篇 shilian zheng
  • 13 篇 guo hong

语言

  • 1,401 篇 英文
  • 53 篇 其他
  • 25 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science And Technology On Communication Information Security"
1479 条 记 录,以下是1-10 订阅
排序:
A Re-transmission Algorithm for Phasor Data Concentrators for Resilience Enhancement of State Estimation  19th
A Re-transmission Algorithm for Phasor Data Concentrators f...
收藏 引用
19th International Conference on Critical information Infrastructures security, CRITIS 2024
作者: Wright, James G. Wolthusen, Stephen D. Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway Department of Information Security Royal Holloway University of London London United Kingdom
To maintain the current safety standards expected within power grids whilst incorporating new functionalities, such as distributed power generation, an increase in the precision of control and sensing devices is ... 详细信息
来源: 评论
security and Privacy for VR in non-entertainment sectors: A practice-based study of the challenges, strategies and gaps
Security and Privacy for VR in non-entertainment sectors: A ...
收藏 引用
2025 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VRW 2025
作者: Sivelle, Camille Palma, David De Moor, Katrien Norwegian University of Science and Technology Department of Information Security and Communication Technology Norway
The adoption of Extended Reality (XR) for non-entertainment use cases, such as healthcare, industry or education, raises new security and privacy (S&P) concerns. Despite an emerging focus on these aspects in the l... 详细信息
来源: 评论
Usage of Cybersecurity Standards in Operational technology Systems  19th
Usage of Cybersecurity Standards in Operational Technology...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain technology, CBT 2024 and 10th Workshop on the security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer security, ESORICS 2024
作者: Kannelønning, Kristian Katsikas, Sokratis Department of Information Security and Communication Technology NTNU - Norwegian University of Science and Technology Postboks 191 Gjøvik2802 Norway
The escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. The advent of Industry 4.0 has interconnect... 详细信息
来源: 评论
Iterative Bounded Distance Decoding With Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on communications 2025年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
Privacy Preserving and Verifiable Outsourcing of AI Processing for Cyber-Physical Systems  26th
Privacy Preserving and Verifiable Outsourcing of AI Processi...
收藏 引用
26th International Conference on information and communications security, ICICS 2024
作者: Spathoulas, Georgios Katsika, Angeliki Kavallieratos, Georgios Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Department of Computer Science and Biomedical Informatics University of Thessaly Lamia Greece
Cyber-physical systems (CPSs) have been used in different domains to enable automation, increase efficiency and effectiveness, and reduce the operational costs of traditional systems. CPSs come with several limitation... 详细信息
来源: 评论
Research on Radar Anti-deceptive-jamming Method based on Characterization  16
Research on Radar Anti-deceptive-jamming Method based on Cha...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Lei, Lei Jiang, Meiqiu Li, JiaChen Guo, Shisheng Cui, Guolong Xia, Bijun Zhu, Lei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Electromagnetic Space Security Chengdu China
Deceptive jamming plays an increasingly important role in radar electronic countermeasures, and there is an urgent need to study new radar anti-deceptive jamming methods. In this paper, four characteristic factors, na... 详细信息
来源: 评论
Delayed interference-based broadband optical chaos generation in a mutual coupled RSOA and DFB system
收藏 引用
Optics Letters 2025年 第10期50卷 3381-3384页
作者: Qian, Jiahao Jiang, Ning Li, Anran Zhang, Yiqun Xu, Bingjie Huang, Wei Qiu, Kun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Tianfu Jiangxi Laboratory Chengdu 641419 China National Key Laboratory of Security Communication Chengdu 610041 China
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l... 详细信息
来源: 评论
A Building-Block Approach to Character-Level Writer Verification on the Great Isaiah Scrolls
收藏 引用
Journal of Imaging science and technology 2025年 第2期69卷
作者: Tobing, T. Lumban Bours, P. Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway
This study presents a novel character-level writer verification framework for ancient manuscripts, employing a building-block approach that integrates decision strategies across multiple token levels, including charac... 详细信息
来源: 评论
security and Privacy for VR in non-entertainment sectors: a practice-based study of the challenges, strategies and gaps
Security and Privacy for VR in non-entertainment sectors: a ...
收藏 引用
Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), IEEE Conference on
作者: Camille Sivelle David Palma Katrien De Moor Department of Information Security and Communication Technology Norwegian University of Science and Technology
The adoption of Extended Reality (XR) for non-entertainment use cases, such as healthcare, industry or education, raises new security and privacy (S&P) concerns. Despite an emerging focus on these aspects in the l... 详细信息
来源: 评论
Root security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1307-1325页
作者: Xiao Feng Xiao Liao Xiaokang Lin Yonggui Wang Information and Communication Research Institute State Grid Information Telecommunication Group Co.Ltd.Beijing102211China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China Smart IoT Business Unit State Grid Info-Telecom Great Power Science and Technology Co.Ltd.Xiamen361008China
In the context of the diversity of smart terminals,the unity of the root of trust becomes complicated,which not only affects the efficiency of trust propagation,but also poses a challenge to the security of the whole ... 详细信息
来源: 评论