咨询与建议

限定检索结果

文献类型

  • 2,347 篇 期刊文献
  • 60 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,652 篇 工学
    • 963 篇 计算机科学与技术...
    • 668 篇 网络空间安全
    • 350 篇 软件工程
    • 333 篇 信息与通信工程
    • 296 篇 电子科学与技术(可...
    • 288 篇 电气工程
    • 182 篇 控制科学与工程
    • 154 篇 仪器科学与技术
    • 143 篇 材料科学与工程(可...
    • 117 篇 机械工程
    • 82 篇 生物医学工程(可授...
    • 75 篇 力学(可授工学、理...
    • 43 篇 环境科学与工程(可...
    • 35 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 28 篇 安全科学与工程
  • 395 篇 管理学
    • 243 篇 管理科学与工程(可...
    • 64 篇 公共管理
    • 55 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 335 篇 理学
    • 213 篇 数学
    • 52 篇 物理学
    • 28 篇 生物学
  • 252 篇 法学
    • 172 篇 政治学
    • 39 篇 社会学
  • 204 篇 医学
    • 183 篇 临床医学
  • 156 篇 经济学
    • 142 篇 应用经济学
  • 53 篇 艺术学
    • 50 篇 设计学(可授艺术学...
  • 47 篇 农学
  • 37 篇 文学
  • 36 篇 军事学
    • 33 篇 军队指挥学
  • 35 篇 教育学
    • 32 篇 教育学
  • 8 篇 历史学
  • 6 篇 哲学

主题

  • 2,422 篇 security
  • 100 篇 privacy
  • 93 篇 network
  • 74 篇 food
  • 71 篇 authentication
  • 69 篇 system
  • 61 篇 internet
  • 61 篇 of
  • 60 篇 and
  • 55 篇 information
  • 53 篇 blockchain
  • 46 篇 management
  • 45 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 internet of thin...
  • 37 篇 cryptography
  • 35 篇 point
  • 34 篇 check
  • 34 篇 微软

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 7 篇 西安电子科技大学
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 上海交通大学
  • 4 篇 清华大学
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 yi ping
  • 4 篇 sasith m. rajaso...

语言

  • 1,484 篇 英文
  • 937 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2422 条 记 录,以下是11-20 订阅
排序:
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Understanding the neighborhoods’in-between spaces on spatial perception,social interaction,and security
收藏 引用
Frontiers of Architectural Research 2024年 第1期13卷 21-36页
作者: Lizeth Félix Mariel Organista Autonomous University of Baja California Ensenada 22860Mexico
This study reflects on the impact that the neighborhoods’in-between spaces have on:spatial perception,social interaction,and *** sites,characterized by their abandonment and deterioration,can also be seen as crucial ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Soils for food security
收藏 引用
Frontiers of Agricultural Science and Engineering 2024年 第2期11卷 213-215页
作者: Guangzhou WANG Qichao ZHU Junling ZHANG State Key Laboratory of Nutrient Use and Management National Academy of Agriculture Green DevelopmentCollege of Resources and Environmental SciencesChina Agricultural UniversityBeijing 100193China
Food security is among the most fundamental of national interests and productive farmland is essential for secure grain *** the increase of agricultural intensification and the impact of global climate change,the soil... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security Risk Assessment in Container Terminals:Empirical Evidence from Greece
收藏 引用
Journal of Traffic and Transportation Engineering 2024年 第5期12卷 214-223页
作者: Constantinos Chlomoudis Petros Pallis Theodore Styliadis Department of Maritime Studies Faculty of Maritime and Industrial StudiesUniversity of PiraeusPiraeus 18532Greece
The most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an“acceptable level”of“safeness”mainly in the lin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ensuring security and Privacy in the Internet of Things: Challenges and Solutions
收藏 引用
Journal of Computer and Communications 2024年 第8期12卷 257-277页
作者: Nur Mohammad Rabeya Khatoon Sadia Islam Nilima Jahanara Akter Md Kamruzzaman Hasan Mahmud Sozib Department of Information Technology Westcliff University 17877 Von Karman Ave 4th Floor Irvine CA 92614 United States Department of Business Administration International American University 3440 Wilshire Blvd STE 1000 Los Angeles CA 90010 United States Department of Business Administration Westcliff University 17877 Von Karman Ave 4th Floor Irvine CA 92614 United States School of Business & Economics North South University Dhaka Bangladesh
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Machine Learning Empowered security and Privacy Architecture for IoT Networks with the Integration of Blockchain
收藏 引用
Intelligent Automation & Soft Computing 2024年 第2期39卷 353-379页
作者: Sohaib Latif M.Saad Bin Ilyas Azhar Imran Hamad Ali Abosaq Abdulaziz Alzubaidi Vincent Karovic Jr. Department of Computer Science The University of ChenabGujrat50700Pakistan Department of Creative Technologies Air UniversityIslamabad42000Pakistan Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran66244Saudi Arabia Department of Computer Science Umm Alqura UniversityAlQunfudah28821Saudi Arabia Department of Information Systems Faculty of ManagementComenius University in BratislavaBratislava82005Slovakia
The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management *** has generated massive volumes of data a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Developing a Distinctively Chinese Social security System Through Concrete Actions
收藏 引用
Qiu Shi 2024年 第3期16卷 23-31页
作者: Wang Xiaoping CPC Leadership Group Ministry of Human Resources and Social Security
Social security is a major issue of national governance,and developing a distinc-tively Chinese social security system is integral to Chinese ***-dent Xi Jinping,who regards work relat-ing to social security as a matt... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cutting-Edge Challenges in Communication Technology and Computer Network security
收藏 引用
Journal of Electronic Research and Application 2024年 第5期8卷 26-31页
作者: Haikang Gu Lanzhou Bowen College of Science and Technology Lanzhou 730100China
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security *** security has become one of the severe challenges f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modeling and Implementation of a Data security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
收藏 引用
Journal of Computer and Communications 2024年 第9期12卷 131-140页
作者: Vincent Mbonigaba Fulgence Nahayo Octave Moutsinga Dieudonné Okalas-Ossami Romeo Nibitanga Thérence Niyonsaba Doctoral School and Faculty of Science and Technology University of Burundi Bujumbura Burundi LUMISTA-ISTA University of Burundi Bujumbura Burundi URMI Masuku University of Science and Technology Franceville Gabon CRIET-FSI University of Burundi Bujumbura Burundi
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Unveiling security,privacy,and ethical concerns of ChatGPT
收藏 引用
Journal of Information and Intelligence 2024年 第2期2卷 102-115页
作者: Xiaodong Wu Ran Duan Jianbing Ni Department of Electrical&Computer Engineering Queen's UniversityKingston K7L 3N6Canada
This paper delves into the realm of ChatGPT,an AI-powered chatbot that utilizes topic modeling and reinforcement learning to generate natural *** ChatGPT holds immense promise across various industries,such as custome... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论