咨询与建议

限定检索结果

文献类型

  • 2,272 篇 期刊文献
  • 60 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,583 篇 工学
    • 902 篇 计算机科学与技术...
    • 605 篇 网络空间安全
    • 301 篇 软件工程
    • 258 篇 信息与通信工程
    • 236 篇 电子科学与技术(可...
    • 179 篇 电气工程
    • 149 篇 仪器科学与技术
    • 139 篇 控制科学与工程
    • 115 篇 材料科学与工程(可...
    • 92 篇 机械工程
    • 40 篇 环境科学与工程(可...
    • 33 篇 生物医学工程(可授...
    • 32 篇 力学(可授工学、理...
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 253 篇 法学
    • 167 篇 政治学
    • 44 篇 社会学
  • 247 篇 理学
    • 130 篇 数学
    • 43 篇 物理学
    • 39 篇 生物学
  • 243 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 52 篇 公共管理
    • 35 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 203 篇 医学
    • 183 篇 临床医学
  • 172 篇 经济学
    • 159 篇 应用经济学
    • 28 篇 理论经济学
  • 52 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 46 篇 农学
  • 38 篇 教育学
    • 28 篇 教育学
  • 34 篇 文学
  • 34 篇 军事学
    • 31 篇 军队指挥学
  • 8 篇 历史学
  • 4 篇 哲学

主题

  • 2,347 篇 security
  • 95 篇 privacy
  • 91 篇 network
  • 73 篇 food
  • 70 篇 system
  • 68 篇 authentication
  • 61 篇 of
  • 60 篇 and
  • 59 篇 internet
  • 55 篇 information
  • 49 篇 blockchain
  • 44 篇 management
  • 44 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 internet of thin...
  • 36 篇 data
  • 35 篇 point
  • 35 篇 cryptography
  • 35 篇 social

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 5 篇 西安电子科技大学
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 中国信息安全技术...
  • 3 篇 山东大学

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 sasith m. rajaso...
  • 4 篇 吴敌

语言

  • 1,431 篇 英文
  • 915 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2347 条 记 录,以下是21-30 订阅
排序:
华中科技大学博士研究生论文被网络安全与隐私计算领域会议USENIX security录用
收藏 引用
信息网络安全 2024年 第7期24卷 1121-1121页
作者: 华中科技大学 华中科技大学
近日,第33届USENIX安全研讨会(33rd USENIX security Symposium 2024)录用结果揭晓,华中科技大学博士研究生冯思乐(导师邹德清教授)的论文“FIRE:Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerab... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Centre for China and Globalisation(CCG)Attends the 60th Munich security Conference(MSC)and Hosts Side Event
收藏 引用
International Understanding 2024年 第1期 45-45页
The Centre for China and Globalisation(CCG)hosted a side event on February 17 titled"China,Europe,and the United States:Climate Cooperation in an Era of Great Power Politics"at the Munich security Conference(MSC)2024,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security and QoS issues in blockchain enabled next-generation smart logistic networks:A tutorial
收藏 引用
Blockchain(Research and Applications) 2022年 第3期3卷 46-59页
作者: Anjali Vaghani Keshav Sood Shui Yu Deakin University GeelongVIC3220Australia University of Technology SydneyNSW2007Australia
The blockchain-enabled smart logistics market is expected to grow worth USD 1620 billion and at a compound annual growth rate of 62.4%.Smart logistics ensures intelligence infrastructure,logistics automation,real-time... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TRUSED:A Trust-Based security Evaluation Scheme for A Distributed Control System
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4381-4398页
作者: Saqib Ali Raja Waseem Anwar Sultan Qaboos University Muscat123Sultanate of OMAN Arab Open University Muscat130Sultanate of OMAN
Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Particle Swarm Optimization Data Hiding for High security Secret Image Sharing
收藏 引用
Computer Systems Science & Engineering 2022年 第12期43卷 931-946页
作者: S.Lakshmi Narayanan Electronics and Communication Engineering Sri Ramakrishna Engineering CollegeCoimbatore641022Tamil NaduIndia
The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital *... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Proof of Activity Protocol for IoMT Data security
收藏 引用
Computer Systems Science & Engineering 2023年 第1期44卷 339-350页
作者: R.Rajadevi K.Venkatachalam Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash Department of Information Technology Kongu Engineering CollegeErode638060TamilnaduIndia Department of Applied Cybernetics Faculty of ScienceUniversity of Hradec KrálovéHradec Králové50003Czech Republic Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time ***,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-Based Robust Data security Scheme in IoT-Enabled Smart Home
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3549-3570页
作者: Anusha Vangala Ashok Kumar Das YoungHo Park Sajjad Shaukat Jamal Center for security Theory and Algorithmic ResearchInternational Institute of Information TechnologyHyderabad500032India School of Electronics Engineering Kyungpook National UniversityDaegu41566Korea Department of Mathematics College of ScienceKing Khalid UniversityAbhaSaudi Arabia
The recent surge in development of smart homes and smart cities can be observed in many developed *** the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Usability and security of Arabic Text-based CAPTCHA Using Visual Cryptography
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 421-440页
作者: Suliman A.Alsuhibany Meznah Alquraishi Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia
Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious *** protect these services,A Completely Automated Public Turing Test to Tell Compute... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Metaheuristic Lightweight Cryptography for security Enhancement in Internet of Things
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3009-3023页
作者: Mahmoud Ragab Ehab Bahaudien Ashary Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Mathematics Department Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Electrical and Computer Engineering Department Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia
The advancements made in Internet of Things(IoT)is projected to alter the functioning of healthcare industry in addition to increased penetration of different ***,data security and private are challenging tasks to acc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A decade of research on patterns and architectures for IoT security
收藏 引用
Cybersecurity 2022年 第2期5卷 27-55页
作者: Tanusan Rajmohan Phu H.Nguyen Nicolas Ferry Capgemini OsloNorway SINTEF OsloNorway UniversitéCôte d’Azur I3S/INRIA KairosSophia AntipolisFrance
security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. security patterns consist of domain-inde... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论