咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是31-40 订阅
排序:
Assessing NFV Network Recovery Strategies after Random Failures and Targeted Attacks  13
Assessing NFV Network Recovery Strategies after Random Failu...
收藏 引用
13th International Workshop on Resilient Networks Design and Modeling, RNDM 2023
作者: Vatten, Trond Jiang, Yuming Heegaard, Poul E. Ntnu - Norwegian University of Science and Technology Department of Information Security and Communication Technology Norway
This paper investigates the critical role of network survivability under random failures or targeted attacks in Network Function Virtualization (NFV) environments and assesses the survivability of NFV networks under d... 详细信息
来源: 评论
ChatGPT Language Model as Support for Teaching and Self-learning in the Field of Engineering and Technical sciences  19thth
ChatGPT Language Model as Support for Teaching and Self-l...
收藏 引用
19th International Conference on Computer Aided Systems Theory, EUROCAST 2024
作者: Czemplik, Anna Karcz-Duleba, Iwona Department of Control Systems and Mechatronics Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
Widespread availability of ChatGPT has posed new challenges for teaching and learning. The paper examines whether and how the chat can be used to support teaching and self-learning in engineering  and technical s... 详细信息
来源: 评论
Analytical Conversion of the Strejc Model to the First Order with Time Delay (FOTD) Model  19thth
Analytical Conversion of the Strejc Model to the First O...
收藏 引用
19th International Conference on Computer Aided Systems Theory, EUROCAST 2024
作者: Czemplik, Anna Department of Control Systems and Mechatronics Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
Several variants of analytical conversion of the Strejc model to the First-Order Time Delay (FOTD) model have been proposed. This conversion extends the applicability of control system design methods that are based on... 详细信息
来源: 评论
Analysis of the Impact of Time Window Lengths on Maintenance Vehicle Routing Problem Efficiency  20th
Analysis of the Impact of Time Window Lengths on Mainten...
收藏 引用
20th International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2025
作者: Pempera, Konrad Jaroszczuk, Michal Department of Control Systems and Mechatronics Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
In this paper the MILP model for Vehicle Routing Problem with Time Windows (VRPTW) is presented in application of building facilities maintenance. Real-life constraints such as time limit constraint and penalties for ... 详细信息
来源: 评论
A Graph-Based Semi-Supervised Approach for Few-Shot Class-Incremental Modulation Classification
收藏 引用
China communications 2024年 第11期21卷 88-103页
作者: Zhou Xiaoyu Qi Peihan Liu Qi Ding Yuanlei Zheng Shilian Li Zan State Key Laboratory of Integrated Service Networks Xidian UniversityXi’an 710071China Xinjiang Astronomical Observatory Chinese Academy of SciencesUrumqi 830011China The No.011 Research Center Science and Technology on Communication Information Security Control LaboratoryJiaxing 314033China
With the successive application of deep learning(DL)in classification tasks,the DL-based modulation classification method has become the preference for its state-of-the-art ***,once the DL recognition model is pre-tra... 详细信息
来源: 评论
Teachers cooperation:team-knowledge distillation for multiple cross-domain few-shot learning
收藏 引用
Frontiers of Computer science 2023年 第2期17卷 91-99页
作者: Zhong JI Jingwei NI Xiyao LIU Yanwei PANG School of Electrical and Information Engineering Tianjin UniversityTianjin 300072China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308China Tianjin Key Laboratory of Brain-Inspired Intelligence Technology Tianjin 300072China
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(C... 详细信息
来源: 评论
Dependency-based security risk assessment for cyber-physical systems
Dependency-based security risk assessment for cyber-physical...
收藏 引用
作者: Akbarzadeh, Aida Katsikas, Sokratis K. Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway
A cyber-physical attack is a security breach in cyber space that impacts on the physical environment. The number and diversity of such attacks against Cyber-Physical Systems (CPSs) are increasing at impressive rates. ... 详细信息
来源: 评论
SAEOn: An Ontological Metamodel for Quantitative security Assurance Evaluation  1
收藏 引用
8th Workshop on the security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2022, 6th International Workshop on security and Privacy Requirements Engineering, SECPRE 2022, 4th Workshop on security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, 3rd Cyber-Physical security for Critical Infrastructures Protection, CPS4CIP 2022, 2nd International Workshop on Cyber Defence Technologies and Secure communications at the Network Edge, CDT and SECOMANE 2022, 1st International Workshop on Election Infrastructure security, EIS 2022 and 1st International Workshop on System security Assurance, SecAssure 2022 held in conjunction with 27th European Symposium on Research in Computer security, ESORICS 2022
作者: Wen, Shao-Fang Katt, Basel Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway
security assurance is a critical aspect in determining the trustworthiness of information and communication technology systems. security assurance evaluation (SAE) is the process responsible for gathering assurance sh... 详细信息
来源: 评论
The Impact of Stealthy Data Integrity Attacks on Wide-Area Monitoring System Applications
The Impact of Stealthy Data Integrity Attacks on Wide-Area M...
收藏 引用
2024 IEEE PES Innovative Smart Grid Technologies Europe Conference, ISGT EUROPE 2024
作者: Mishchenko, Denys Oleinikova, Irina Erdodi, László Pokhrel, Basanta Raj Norwegian University of Science and Technology Department of Electric Energy Trondheim Norway Norwegian University of Science and Technology Department of Information Security and Communication Technology Trondheim Norway
Cybersecurity has become a paramount concern in light of the potential consequences of disruptions within the energy sector, such as widespread outages resulting from successful cyber-attacks. To meet this challenge t... 详细信息
来源: 评论
Frequency Agile Strategy Design of Radar Network for Wideband Sweep Jamming via Coalition Formation Game
收藏 引用
IEEE Transactions on Aerospace and Electronic Systems 2025年 第3期61卷 7906-7919页
作者: Liao, Maosen Xiong, Kui Zhang, Long Yu, Xianxiang Cui, Guolong University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Laboratory of Electromagnetic Space Cognition and Intelligent Control Technology Beijing100089 China School of Information and Communication Engineering Chengdu611731 China UESTC Shenzhen Institute for Advanced Study Chengdu611731 China
This article proposes an intelligent frequency agile strategy design for radar network using coalition game theory to counter wideband sweep jamming, which is formulated as a two-stage decision-making problem. In the ... 详细信息
来源: 评论