咨询与建议

限定检索结果

文献类型

  • 2,347 篇 期刊文献
  • 60 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,652 篇 工学
    • 963 篇 计算机科学与技术...
    • 668 篇 网络空间安全
    • 350 篇 软件工程
    • 333 篇 信息与通信工程
    • 296 篇 电子科学与技术(可...
    • 288 篇 电气工程
    • 182 篇 控制科学与工程
    • 154 篇 仪器科学与技术
    • 143 篇 材料科学与工程(可...
    • 117 篇 机械工程
    • 82 篇 生物医学工程(可授...
    • 75 篇 力学(可授工学、理...
    • 43 篇 环境科学与工程(可...
    • 35 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 28 篇 安全科学与工程
  • 395 篇 管理学
    • 243 篇 管理科学与工程(可...
    • 64 篇 公共管理
    • 55 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 335 篇 理学
    • 213 篇 数学
    • 52 篇 物理学
    • 28 篇 生物学
  • 252 篇 法学
    • 172 篇 政治学
    • 39 篇 社会学
  • 204 篇 医学
    • 183 篇 临床医学
  • 156 篇 经济学
    • 142 篇 应用经济学
  • 53 篇 艺术学
    • 50 篇 设计学(可授艺术学...
  • 47 篇 农学
  • 37 篇 文学
  • 36 篇 军事学
    • 33 篇 军队指挥学
  • 35 篇 教育学
    • 32 篇 教育学
  • 8 篇 历史学
  • 6 篇 哲学

主题

  • 2,422 篇 security
  • 100 篇 privacy
  • 93 篇 network
  • 74 篇 food
  • 71 篇 authentication
  • 69 篇 system
  • 61 篇 internet
  • 61 篇 of
  • 60 篇 and
  • 55 篇 information
  • 53 篇 blockchain
  • 46 篇 management
  • 45 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 internet of thin...
  • 37 篇 cryptography
  • 35 篇 point
  • 34 篇 check
  • 34 篇 微软

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 7 篇 西安电子科技大学
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 上海交通大学
  • 4 篇 清华大学
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 yi ping
  • 4 篇 sasith m. rajaso...

语言

  • 1,484 篇 英文
  • 937 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2422 条 记 录,以下是1-10 订阅
排序:
security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions,and Future Directions
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2511-2533页
作者: Ahmad Rahdari Ahmad Jalili Mehdi Esnaashari Mehdi Gheisari Alisa A.Vorobeva Zhaoxi Fang Panjun Sun Viktoriia M.Korzhuk Ilya Popov Zongda Wu Hamid Tahaei Institute of Artificial Intelligence Shaoxing UniversityShaoxing312000China Department of Computer Engineering Gonbad Kavous UniversityGonbad-e Kavus49717-99151Iran Faculty of Computer Engineering K.N.Toosi University of TechnologyTehran196976-4499Iran Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Secure Information Technologies Department National Research University ITMOSt.Petersburg197101Russia School of Electrical and Computer Engineering Shiraz UniversityShiraz71946–84334Iran Department of Computer Science and Engineering Islamic Azad UniversityDamavand***Iran Department of R&D Shenzhen BKD Co.Ltd.Shenzhen518000China
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4781-4803页
作者: Ahmed Redha Mahlous College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudia Arabia
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary *** today’s world where technology is everything,these techn... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Review on security Defense Technology Research in Edge Computing Environment
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 1-18页
作者: Ke SHANG Weizhen HE Shuai ZHANG National Digital Switching System Engineering and Technological R&D Center
Edge computing, which achieves quick data processing by sinking data computing and storage to the network edge, has grown rapidly along with the Internet of things. The new network architecture of edge computing bring... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On the security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2240-2261页
作者: MA Guangsheng LI Hongbo School of Mathematics and Physics North China Electric Power University Academy of Mathematics and Systems Science Chinese Academy of Sciences University of Chinese Academy of Sciences
Fully homomorphic encryption(FHE) can be used for privacy-preserving aggregation of medical data. In this typical application, the security against passive attacks has been well studied by Li and Micciancio(2021).... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Review on the security of the Ethereum-Based DeFi Ecosystem
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 69-101页
作者: Yue Xue Dunqiu Fan Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian Cyberspace Institute of Advanced Technology Guangzhou UniversityGuanzhou510000China Innovation Center NSFOCUS Inc.Beijing100089China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of EducationBeijing100816China
Decentralized finance(DeFi)is a general term for a series of financial products and *** is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary *** them... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Systematic security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Network security Enhanced with Deep Neural Network-Based Intrusion Detection System
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1457-1490页
作者: Fatma S.Alrayes Mohammed Zakariah Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia College of Computer and Information Sciences King Saud UniversityRiyadh11362Saudi Arabia College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Educational Technologies College of EducationImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced security
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Review on security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 3917-3943页
作者: Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal Department of Cybersecurity College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of ICT Faculty of TechnologyUniversity of ColomboColombo00700Sri Lanka Department of Computer Science Federal University DutseDutse720102Nigeria Faculty of Integrated Technologies Universiti Brunei DarussalamGadongBE1410Brunei Darusalam
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital ***,as industries become increasingly interconnected and reliant on... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Towards a lightweight security framework using blockchain and machine learning
收藏 引用
BLOCKCHAIN-RESEARCH AND APPLICATIONS 2024年 第1期5卷 107-118页
作者: Ismail, Shereen Nouman, Muhammad Dawoud, Diana W. Reza, Hassan Univ North Dakota Sch Elect Engn & Comp Sci Grand Forks ND 58202 USA COMSATS Univ Islamabad Dept Comp Sci Islamabad 44000 Pakistan Univ Dubai Coll Engn & Informat Technol Dubai U Arab Emirates
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor networks, necessitating the development of robust countermeasures tailored to their unique characteristics and limitations.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论