咨询与建议

限定检索结果

文献类型

  • 130 篇 期刊文献
  • 31 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 112 篇 计算机科学与技术...
    • 35 篇 网络空间安全
    • 33 篇 电气工程
    • 29 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 15 篇 软件工程
    • 13 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 7 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 3 篇 生物医学工程(可授...
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 安全科学与工程
    • 1 篇 轻工技术与工程
    • 1 篇 环境科学与工程(可...
  • 46 篇 理学
    • 35 篇 数学
    • 8 篇 物理学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 统计学(可授理学、...
    • 1 篇 天文学
    • 1 篇 生物学
  • 15 篇 管理学
    • 8 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 公安学
  • 1 篇 医学

主题

  • 163 篇 information secu...
  • 11 篇 cryptography
  • 7 篇 trusted computin...
  • 6 篇 cryptology
  • 5 篇 privacy
  • 5 篇 information hidi...
  • 4 篇 image encryption
  • 4 篇 blockchain
  • 4 篇 quantum cryptogr...
  • 4 篇 信息安全
  • 4 篇 network security
  • 3 篇 deep learning
  • 3 篇 e-commerce
  • 3 篇 compliance
  • 3 篇 data security
  • 3 篇 access control
  • 3 篇 data mining
  • 3 篇 authentication
  • 3 篇 cryptanalysis
  • 3 篇 machine learning

机构

  • 7 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 湖南大学
  • 2 篇 school of comput...
  • 2 篇 information secu...
  • 2 篇 department of co...
  • 2 篇 institute of sof...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 department of ph...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 college of elect...
  • 1 篇 faculty of infor...
  • 1 篇 department of co...
  • 1 篇 college of mathe...
  • 1 篇 department of ar...
  • 1 篇 school of comput...
  • 1 篇 school of electr...

作者

  • 9 篇 zhang huanguo
  • 3 篇 ma jianfeng
  • 3 篇 china
  • 2 篇 穆怡
  • 2 篇 olatunde abiona
  • 2 篇 fawaz alassery
  • 2 篇 licheng zheng
  • 2 篇 王延飞
  • 2 篇 yike li
  • 2 篇 hengwei lin
  • 2 篇 jiaren du
  • 2 篇 kai jiang
  • 2 篇 zhongjun li
  • 2 篇 wang yahui
  • 1 篇 秦波
  • 1 篇 xiangyang luo
  • 1 篇 thamer nouh
  • 1 篇 bruce z. gao
  • 1 篇 abu sarwar zaman...
  • 1 篇 k.sudharson

语言

  • 135 篇 英文
  • 28 篇 中文
检索条件"主题词=Information Security"
163 条 记 录,以下是1-10 订阅
排序:
information security in the Cloud: Emerging Trends and Challenges
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第5期17卷 69-80页
作者: Keerthana Chitreddy Andrew Mikhl Anthony Chinna Manikanta Bandaru Olatunde Abiona Department of Computer information Systems Indiana University Northwest Gary IN USA
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyber Resilience through Real-Time Threat Analysis in information security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Metaheuristics with Machine Learning Enabled information security on Cloud Environment
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 1557-1570页
作者: Haya Mesfer Alshahrani Faisal S.Alsubaei Taiseer Abdalla Elfadil Eisa Mohamed K.Nour Manar Ahmed Hamza Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen Department of information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Department of information Systems-Girls Section King Khalid UniversityMahayil62529Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment.Cloud computing(CC)is used for storing as well as processing data.Theref... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Neural variability fingerprint predicts individuals,information security violation intentions
收藏 引用
Fundamental Research 2022年 第2期2卷 303-310页
作者: Qin Duan Zhengchuan Xu Qing Hu Siyang Luo Department of Psychology Guangdong Provincial Key Laboratory of Social Cognitive Neuroscience and Mental HealthGuangdong Provincial Key Laboratory of Brain Function and DiseaseSun Yat-Sen UniversityGuangzhou 510006China Fudan University Shanghai 200433China The Koppelman School of Business Brooklyn CollegeThe City University of New YorkNew YorkUSA
As the weakest links in information security defense are the individuals in an organizations,it is important to understand their information security behaviors.In the current study,we tested whether the neural variabi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
information security assurance lifecycle research
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第4期14卷 77-81页
作者: XIE Cheng-shan XUJIA Gu-yue WANG Li State Key Laboratory of information security Beijing 100038 China School of Economy and Management Beihang University Beijing 100083 China
This article proposes that problems of information security are mainly caused by the ineffective integration of people, operation, and technology, and not merely by the poor use of technology. Based on the information... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
information security through controlled quantum teleportation networks
收藏 引用
Digital Communications and Networks 2020年 第4期6卷 463-470页
作者: Hala Hamdoun Alaa Sagheer Center for Artificial Intelligence and RObotics(CAIRO) Department of Computer ScienceAswan UniversityAswanEgypt Department of Computer Science College of Computer Science and Information TechnologyKing Faisal UniversitySaudi Arabia
information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A convolutional neural network to detect possible hidden data in spatial domain images
收藏 引用
Cybersecurity 2024年 第1期7卷 37-52页
作者: Jean De La Croix Ntivuguruzwa Tohari Ahmad Department of Informatics Institut Teknologi Sepuluh Nopember(ITS)Kampus ITS Keputih SukoliloSurabaya60111Indonesia African Center of Excellence in the Internet of Things College of Science and TechnologyUniversity of Rwanda3900KigaliRwanda
Hiding secret data in digital multimedia has been essential to protect the data.Nevertheless,attackers with a steganalysis technique may break them.Existing steganalysis methods have good results with conventional Mac... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1613-1633页
作者: Jingyu Zhang Pian Zhou Jin Wang Osama Alfarraj Saurabh Singh Min Zhu School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410015China Science and Technology on information Systems Engineering Laboratory School of Systems EngineeringNational University of Defense TechnologyChangsha410073China Computer Science Department King Saud UniversityRiyadh11437Saudi Arabia Department of Artificial Intelligence and Big Data Woosong UniversityDaejeon34606South Korea College of information Science and Technology Zhejiang Shuren UniversityHangzhou310015China
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TULAM:trajectory-user linking via attention mechanism
收藏 引用
Science China(information Sciences) 2024年 第1期67卷 51-68页
作者: Hao LI Shuyu CAO Yaqing CHEN Min ZHANG Dengguo FENG Trusted Computing and information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences University of Chinese Academy of Sciences
Recently,the application of location-based services(LBS) has become a prevalent means to provide convenience in customers’ everyday lives.However,because massive volumes of location information are collected by LBS a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Hybrid Method of Coreference Resolution in information security
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1297-1315页
作者: Yongjin Hu Yuanbo Guo Junxiu Liu Han Zhang information Engineering University Zhengzhou450000China Intelligent Systems Research Centre School of ComputingEngineering&Intelligent SystemsUlster UniversityMagee CampusNorthern IrelandBT487JLUK Zheng Zhou University Zhengzhou450001China
In the field of information security,a gap exists in the study of coreference resolution of entities.A hybrid method is proposed to solve the problem of coreference resolution in information security.The work consists... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论