咨询与建议

限定检索结果

文献类型

  • 2,347 篇 期刊文献
  • 60 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,652 篇 工学
    • 963 篇 计算机科学与技术...
    • 668 篇 网络空间安全
    • 350 篇 软件工程
    • 333 篇 信息与通信工程
    • 296 篇 电子科学与技术(可...
    • 288 篇 电气工程
    • 182 篇 控制科学与工程
    • 154 篇 仪器科学与技术
    • 143 篇 材料科学与工程(可...
    • 117 篇 机械工程
    • 82 篇 生物医学工程(可授...
    • 75 篇 力学(可授工学、理...
    • 43 篇 环境科学与工程(可...
    • 35 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 28 篇 安全科学与工程
  • 395 篇 管理学
    • 243 篇 管理科学与工程(可...
    • 64 篇 公共管理
    • 55 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 335 篇 理学
    • 213 篇 数学
    • 52 篇 物理学
    • 28 篇 生物学
  • 252 篇 法学
    • 172 篇 政治学
    • 39 篇 社会学
  • 204 篇 医学
    • 183 篇 临床医学
  • 156 篇 经济学
    • 142 篇 应用经济学
  • 53 篇 艺术学
    • 50 篇 设计学(可授艺术学...
  • 47 篇 农学
  • 37 篇 文学
  • 36 篇 军事学
    • 33 篇 军队指挥学
  • 35 篇 教育学
    • 32 篇 教育学
  • 8 篇 历史学
  • 6 篇 哲学

主题

  • 2,422 篇 security
  • 100 篇 privacy
  • 93 篇 network
  • 74 篇 food
  • 71 篇 authentication
  • 69 篇 system
  • 61 篇 internet
  • 61 篇 of
  • 60 篇 and
  • 55 篇 information
  • 53 篇 blockchain
  • 46 篇 management
  • 45 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 internet of thin...
  • 37 篇 cryptography
  • 35 篇 point
  • 34 篇 check
  • 34 篇 微软

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 7 篇 西安电子科技大学
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 上海交通大学
  • 4 篇 清华大学
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 yi ping
  • 4 篇 sasith m. rajaso...

语言

  • 1,484 篇 英文
  • 937 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2422 条 记 录,以下是121-130 订阅
排序:
Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2017年 第2期10卷 241-256页
作者: Vivek V.Jog Senthil Murugan,T. Department of Computer Science and Engineering Vel Tech Dr.RR&Dr.SR Technical UniversityChennaiIndia
Purpose-Due to the connectivity of the multiple devices and the systems on the same network,rapid development has become possible in Internet of Things(IoTs)for the last ***,IoT is mostly affected with severe security... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A roadmap for security challenges in the Internet of Things
收藏 引用
Digital Communications and Networks 2018年 第2期4卷 118-137页
作者: Arbia Riahi Sfar Enrico Natalizio Yacine Challal Zied Chtourou VRIT Lab - Military Academy Nabeul Tunisia Sorbonne Universites Universite de technologie de Compiegne CNRS Heudiasyc UMR 7253 CS 60319 60203 Compiegne Cedex France Laboratoire de Methodes de Conception de Systemes (LMCS) Ecole Nationale Superieure d'Informatique (ESI) Centre de Recherche sur I'Information Scientifique et Technique (CERIST) Algiers Algeria
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent object... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security Governance and ASEAN's Political security Community:Fragmented but Inclusive security Communities?
收藏 引用
Fudan Journal of the Humanities and Social Sciences 2020年 第1期13卷 151-167页
作者: Mely Caballero-Anthony S.Rajaratnam School of International Studies(RSIS) Block S4Level B4-2&50 Nanyang AvenueSingapore 639798Singapore
The establishment of the ASEAN Political and security(APSC)in 2015 mimics the notion of a security community where member states are imbued with deep habits of cooperation,mutual trust,a sense of'we-feeling'and the ab... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A comprehensive survey on security issues in vehicle-to-grid networks
收藏 引用
Journal of Control and Decision 2023年 第2期10卷 150-159页
作者: Arun Sekar Rajasekaran Maria Azees Fadi Al-Turjman Department of Electronics and Communication Engineering GMR Institute of TechnologyRajamIndia Artificial Intelligence Engineering Department. Research Center for AI and IoTAI and Robotics InstituteNear East UniversityMersin 10Turkey
Vehicle to grid(V2G)is the most hopeful approach to transfer energy as well as information in the bidirectional way.V2G network is formed by electric vehicles which connect with smart metres for information and energy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security of polarization-shift keying chaos optical communication system
收藏 引用
Frontiers of Optoelectronics 2008年 第Z1期1卷 64-69页
作者: Nian FANG Lutang WANG Shuqin GUO Zhaoming HUANG School of Communication and Information Engineering Shanghai University College of Information and Engineering Zhejiang University of Technology
To evaluate the security of a chaos optical communication system employing the polarization-shift keying(PolSK) modulation technology, its chaos characteristic needs to be verified. In this paper, an analysis was done... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
ESE: Efficient security Enhancement Method for the Secure Aggregation Protocol in Federated Learning
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 542-555页
作者: TIAN Haibo LI Maonan REN Shuangyin School of Computer Science and Engineering Sun Yat-Sen University
In federated learning, a parameter server may actively infer sensitive data of users and a user may arbitrarily drop out of a learning process. Bonawitz et al. propose a secure aggregation protocol for federated learn... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secured Cyber security Algorithm for Healthcare System Using Blockchain Technology
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1889-1906页
作者: D.Doreen Hephzibah Miriam Deepak Dahiya Nitin C.R.Rene Robin Computational Intelligence Research Foundation(CIRF) Chennai600023TamilnaduIndia College of Computer and Information Sciences Majmaah UniversityMajmaah11952Saudi Arabia Department of Electrical Engineering and Computer Science College of Engineering and Applied ScienceUniversity of CincinnatiCincinnati45221OHUnited States Department of Computer Science and Engineering Sri Sairam Engineering CollegeChennai600044TamilnaduIndia
Blockchain technology is critical in cyber *** most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic *** of the ethical and legal implications of a patient’s medical data... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A genetic solution for the global food security crisis
收藏 引用
Journal of Integrative Plant Biology 2023年 第6期65卷 1359-1361页
作者: Sunil K.Sahu Huan Liu State Key Laboratory of Agricultural Genomics BGI‐ShenzhenShenzhen518083China College of Life Sciences University of Chinese Academy of SciencesBeijing100049China
Due to the rapid increase in population and the decreasing availability of arable land and freshwater resources per capita,global crop production will need to double by 2050 to meet human food *** early March,the Worl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Editorial for special issue on “security and privacy protection in the era of IoT devices”
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 245-246页
作者: Weizhi Meng Daniel Xiapu Luo Chunhua Su Debiao He Marios Anagnostopoulos Qian Chen Technical University of Denmark Denmark Hong Kong Polytechnic University China University of Aizu Japan Wuhan University China Aalborg University Denmark University of Texas at San Antonio USA
IoT devices like smartphones have become an important personal assistant and an indispensable part of our daily life and *** more and more users storing their private data on their mobile phones,it becomes imperative ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Process Expression of security Automaton
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2007年 第6期12卷 736-739页
作者: 余万涛 胡光锐 Dept. of Electronic Information Shanghai Jiaotong Univ.
security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal method... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论