咨询与建议

限定检索结果

文献类型

  • 2,259 篇 期刊文献
  • 59 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,333 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,580 篇 工学
    • 901 篇 计算机科学与技术...
    • 604 篇 网络空间安全
    • 302 篇 软件工程
    • 258 篇 信息与通信工程
    • 234 篇 电子科学与技术(可...
    • 179 篇 电气工程
    • 149 篇 仪器科学与技术
    • 139 篇 控制科学与工程
    • 115 篇 材料科学与工程(可...
    • 92 篇 机械工程
    • 40 篇 环境科学与工程(可...
    • 33 篇 生物医学工程(可授...
    • 32 篇 力学(可授工学、理...
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 247 篇 理学
    • 130 篇 数学
    • 43 篇 物理学
    • 39 篇 生物学
  • 242 篇 法学
    • 157 篇 政治学
    • 44 篇 社会学
  • 242 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 52 篇 公共管理
    • 35 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 203 篇 医学
    • 183 篇 临床医学
  • 172 篇 经济学
    • 159 篇 应用经济学
    • 28 篇 理论经济学
  • 52 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 46 篇 农学
  • 39 篇 教育学
    • 29 篇 教育学
  • 34 篇 文学
  • 34 篇 军事学
    • 31 篇 军队指挥学
  • 8 篇 历史学
  • 4 篇 哲学

主题

  • 2,333 篇 security
  • 95 篇 privacy
  • 91 篇 network
  • 73 篇 food
  • 70 篇 system
  • 67 篇 authentication
  • 61 篇 of
  • 60 篇 and
  • 59 篇 internet
  • 55 篇 information
  • 49 篇 blockchain
  • 44 篇 management
  • 44 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 data
  • 35 篇 internet of thin...
  • 35 篇 point
  • 35 篇 cryptography
  • 35 篇 social

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 5 篇 西安电子科技大学
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 中国信息安全技术...
  • 3 篇 山东大学

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 sasith m. rajaso...
  • 4 篇 吴敌

语言

  • 1,403 篇 英文
  • 929 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2333 条 记 录,以下是1-10 订阅
排序:
Review on security Defense Technology Research in Edge Computing Environment
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 1-18页
作者: Ke SHANG Weizhen HE Shuai ZHANG National Digital Switching System Engineering and Technological R&D Center
Edge computing, which achieves quick data processing by sinking data computing and storage to the network edge, has grown rapidly along with the Internet of things. The new network architecture of edge computing bring... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Review on the security of the Ethereum-Based DeFi Ecosystem
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 69-101页
作者: Yue Xue Dunqiu Fan Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian Cyberspace Institute of Advanced Technology Guangzhou UniversityGuanzhou510000China Innovation Center NSFOCUS Inc.Beijing100089China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of EducationBeijing100816China
Decentralized finance(DeFi)is a general term for a series of financial products and *** is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary *** them... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4781-4803页
作者: Ahmed Redha Mahlous College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudia Arabia
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary *** today’s world where technology is everything,these techn... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Systematic security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced security
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Network security Enhanced with Deep Neural Network-Based Intrusion Detection System
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1457-1490页
作者: Fatma S.Alrayes Mohammed Zakariah Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia College of Computer and Information Sciences King Saud UniversityRiyadh11362Saudi Arabia College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Educational Technologies College of EducationImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Understanding the neighborhoods’in-between spaces on spatial perception,social interaction,and security
收藏 引用
Frontiers of Architectural Research 2024年 第1期13卷 21-36页
作者: Lizeth Félix Mariel Organista Autonomous University of Baja California Ensenada 22860Mexico
This study reflects on the impact that the neighborhoods’in-between spaces have on:spatial perception,social interaction,and *** sites,characterized by their abandonment and deterioration,can also be seen as crucial ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Soils for food security
收藏 引用
Frontiers of Agricultural Science and Engineering 2024年 第2期11卷 213-215页
作者: Guangzhou WANG Qichao ZHU Junling ZHANG State Key Laboratory of Nutrient Use and Management National Academy of Agriculture Green DevelopmentCollege of Resources and Environmental SciencesChina Agricultural UniversityBeijing 100193China
Food security is among the most fundamental of national interests and productive farmland is essential for secure grain *** the increase of agricultural intensification and the impact of global climate change,the soil... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Machine Learning Empowered security and Privacy Architecture for IoT Networks with the Integration of Blockchain
收藏 引用
Intelligent Automation & Soft Computing 2024年 第2期39卷 353-379页
作者: Sohaib Latif M.Saad Bin Ilyas Azhar Imran Hamad Ali Abosaq Abdulaziz Alzubaidi Vincent Karovic Jr. Department of Computer Science The University of ChenabGujrat50700Pakistan Department of Creative Technologies Air UniversityIslamabad42000Pakistan Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran66244Saudi Arabia Department of Computer Science Umm Alqura UniversityAlQunfudah28821Saudi Arabia Department of Information Systems Faculty of ManagementComenius University in BratislavaBratislava82005Slovakia
The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management *** has generated massive volumes of data a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论