咨询与建议

限定检索结果

文献类型

  • 2,444 篇 会议
  • 804 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 3,271 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,909 篇 工学
    • 1,090 篇 计算机科学与技术...
    • 842 篇 软件工程
    • 654 篇 信息与通信工程
    • 316 篇 电子科学与技术(可...
    • 242 篇 电气工程
    • 222 篇 控制科学与工程
    • 187 篇 光学工程
    • 128 篇 机械工程
    • 122 篇 仪器科学与技术
    • 98 篇 动力工程及工程热...
    • 91 篇 生物工程
    • 80 篇 交通运输工程
    • 80 篇 生物医学工程(可授...
    • 56 篇 安全科学与工程
    • 51 篇 航空宇航科学与技...
    • 49 篇 化学工程与技术
    • 42 篇 材料科学与工程(可...
    • 42 篇 建筑学
  • 834 篇 理学
    • 424 篇 数学
    • 295 篇 物理学
    • 156 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 109 篇 生物学
    • 42 篇 化学
  • 448 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 79 篇 医学
    • 70 篇 临床医学
    • 68 篇 基础医学(可授医学...
  • 69 篇 法学
    • 54 篇 社会学
  • 40 篇 经济学
  • 15 篇 教育学
  • 15 篇 农学
  • 6 篇 军事学
  • 6 篇 艺术学
  • 4 篇 文学
  • 1 篇 哲学

主题

  • 143 篇 computer network...
  • 98 篇 protocols
  • 85 篇 bandwidth
  • 83 篇 computational mo...
  • 77 篇 wireless sensor ...
  • 71 篇 quality of servi...
  • 68 篇 optimization
  • 66 篇 routing
  • 61 篇 vehicles
  • 59 篇 servers
  • 59 篇 hardware
  • 57 篇 computer archite...
  • 57 篇 telecommunicatio...
  • 55 篇 accuracy
  • 55 篇 training
  • 54 篇 throughput
  • 52 篇 wireless communi...
  • 49 篇 resource managem...
  • 49 篇 measurement
  • 48 篇 ip networks

机构

  • 115 篇 state key labora...
  • 82 篇 department of sy...
  • 50 篇 institute of ope...
  • 41 篇 state key labora...
  • 31 篇 department of sy...
  • 30 篇 state key labora...
  • 29 篇 computer network...
  • 27 篇 state key labora...
  • 25 篇 department of sy...
  • 24 篇 state key labora...
  • 23 篇 state key labora...
  • 22 篇 information syst...
  • 18 篇 department of co...
  • 18 篇 institute of ope...
  • 18 篇 institute of ope...
  • 17 篇 peng cheng labor...
  • 17 篇 lviv polytechnic...
  • 15 篇 school of electr...
  • 15 篇 state key labora...
  • 15 篇 chair of systems...

作者

  • 95 篇 reinhard german
  • 83 篇 lars wolf
  • 55 篇 krzysztof walkow...
  • 53 篇 german reinhard
  • 52 篇 vyacheslav kharc...
  • 49 篇 guo hong
  • 49 篇 kharchenko vyach...
  • 44 篇 wolf lars
  • 37 篇 bartosz krawczyk
  • 34 篇 falko dressler
  • 30 篇 walkowiak krzysz...
  • 28 篇 woźniak michal
  • 26 篇 kunanets natalii...
  • 24 篇 marios m. polyca...
  • 24 篇 christos g. pana...
  • 24 篇 michał woźniak
  • 24 篇 kurzynski marek
  • 24 篇 xingjun wang
  • 23 篇 xiang cheng
  • 23 篇 michal wozniak

语言

  • 2,919 篇 英文
  • 282 篇 其他
  • 70 篇 中文
  • 1 篇 芬兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Systems and Computer Networks"
3271 条 记 录,以下是1-10 订阅
排序:
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer for Distributed Intrusion Detection systems in Advanced networks  6
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer ...
收藏 引用
6th International Conference on Networking and Advanced systems, ICNAS 2023
作者: Sakraoui, Sabrina Derdour, Makhlouf Ahmim, Ahmed Badji Mokhtar Annaba University Networks and Systems Laboratory Department of Computer Science Annaba Algeria Oum El Bouaghi University Networks and Systems Laboratory Department of Computer Science Oum El Bouaghi Algeria Mohamed-Cherif Messaadia University Networks and Systems Laboratory Dpt. of Mathematics and Computer Science Souk Ahras Algeria
As the development of wireless networks advances towards the deployment of 6G technology, ensuring robust security measures becomes crucial. In this paper, we propose 6G-SECUREIDS, a novel intrusion detection system d... 详细信息
来源: 评论
Evaluating the Effects of Different Layer Multiconnectivity on Reliable Multihop Industrial WSNs
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21604-21617页
作者: Schlichter, Jan Schwarz, Maximilian Wolf, Lars Institute of Operating Systems and Computer Networks TU Braunschweig Braunschweig38106 Germany
Increasing the reliability of multihop industrial wireless sensor networks (IWSNs) is an important challenge to enable continuous data collection in industrial processes. One approach for increasing reliability is mul... 详细信息
来源: 评论
Unsupervised Concept Drift Detection Based on Parallel Activations of Neural Network  1st
Unsupervised Concept Drift Detection Based on Parallel Acti...
收藏 引用
1st International Workshop on Discovering Drift Phenomena in Evolving Landscapes, DELTA 2024
作者: Komorniczak, Joanna Ksieniewicz, Pawel Department of Systems and Computer Networks Wroclaw University of Science and Technology Wroclaw Poland
Practical applications of artificial intelligence increasingly often have to deal with the streaming properties of real data, which, considering the time factor, are subject to phenomena such as periodicity and more o... 详细信息
来源: 评论
Transcoding-Enabled Edge Caching Strategy Optimization: A Dual-Timescale Meta-Learning Based Stackelberg Game Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23309-23323页
作者: Wang, Dan Zhu, Keke Song, Bin Yu, F. Richard Xidian University State Key Laboratory of Integrated Services Networks 710071 China Carleton University Department of Systems and Computer Engineering Ottawa Canada
The explosive growth in video services has significantly strained current mobile network infrastructure, leading to spectrum scarcity, backhaul congestion, and degraded quality of experience. While edge caching has em... 详细信息
来源: 评论
Integration of Fault Tree Analysis into Model-Based Product Line Engineering in Railway Vehicles  8
Integration of Fault Tree Analysis into Model-Based Product ...
收藏 引用
8th International Conference on System Reliability and Safety, ICSRS 2024
作者: Dibaei, Mahdi Fellerer, Jonathan Arestova, Anna Hielscher, Kai-Steffen German, Reinhard Computer Networks and Communication Systems University of Erlangen-Nürnberg Erlangen Germany
Reliability analysis based on fault trees is one of the important methods for determining the cause of system failure by beginning from the top event and proceeding to the basic events, however, it is usually overlook... 详细信息
来源: 评论
Changing Lineup Classifier Ensemble for Drifting Imbalanced Data Streams  24
Changing Lineup Classifier Ensemble for Drifting Imbalanced ...
收藏 引用
24th IEEE International Conference on Data Mining Workshops, ICDMW 2024
作者: Wegier, Weronika Maczynski, Maciej Wozniak, Michal Wroclaw University of Science and Technology Department of Systems and Computer Networks Wroclaw Poland
Currently, most data requires stream processing. This kind of processing causes new challenges in classifier learning method, such as data difficulties for example data imbalance since we cannot observe the entire set... 详细信息
来源: 评论
PriMiRe: Privacy-Preserving Misbehavior Reporting for ETSI C-ITS  100
PriMiRe: Privacy-Preserving Misbehavior Reporting for ETSI C...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Willecke, Alexander Schulze, Fynn Wolf, Lars C. Technische Universität Braunschweig Insitute of Operating Systems and Computer Networks Germany
In Europe, the C-ITS Security Certificate Management System supplies pseudonymous credentials to valid stations, allowing them to authenticate each other when exchanging messages. Detecting misbehavior and evicting of... 详细信息
来源: 评论
Non-stationary Imbalanced Data Stream Classification with Weighted One-Class Ensemble  24
Non-stationary Imbalanced Data Stream Classification with We...
收藏 引用
24th IEEE International Conference on Data Mining Workshops, ICDMW 2024
作者: Klikowski, Jakub Wozniak, Michal Wroclaw University of Science and Technology Department of Systems and Computer Networks Wroclaw Poland
The presented study focuses on imbalanced data stream classification that requires fast processing of incoming data without memorizing it. An additional difficulty is the imbalanced data distribution, i.e., significan... 详细信息
来源: 评论
A Heuristic Variable Ordering Approach for Fault Tree Conversion to Binary Decision Diagram  6
A Heuristic Variable Ordering Approach for Fault Tree Conver...
收藏 引用
6th International Conference on System Reliability and Safety Engineering, SRSE 2024
作者: Dibaei, Mahdi Hielscher, Kai-Steffen German, Reinhard University of Erlangen-Nürnberg Computer Networks and Communication Systems Erlangen Germany
Various methods have been introduced and developed to analyze fault tree diagrams. One of the interesting methods is fault tree conversion to Binary Decision Diagram (BDD). However, the conversion process of fault tre... 详细信息
来源: 评论
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer for Distributed Intrusion Detection systems in Advanced networks
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer ...
收藏 引用
International Conference on Networking and Advanced systems (ICNAS)
作者: Sabrina Sakraoui Makhlouf Derdour Ahmed Ahmim Department of Computer Science Networks and Systems Laboratory Badji Mokhtar Annaba University Annaba Algeria Department of Computer Science Networks and Systems Laboratory Oum El Bouaghi University Oum El Bouaghi Algeria Dpt. of Mathematics and Computer Science Networks and Systems Laboratory Mohamed-Cherif Messaadia University Souk Ahras Algeria
As the development of wireless networks advances towards the deployment of 6G technology, ensuring robust security measures becomes crucial. In this paper, we propose 6G-SECUREIDS, a novel intrusion detection system d...
来源: 评论