咨询与建议

限定检索结果

文献类型

  • 2,238 篇 期刊文献
  • 60 篇 会议
  • 11 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,310 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,533 篇 工学
    • 878 篇 计算机科学与技术...
    • 457 篇 网络空间安全
    • 195 篇 信息与通信工程
    • 172 篇 电气工程
    • 159 篇 电子科学与技术(可...
    • 138 篇 仪器科学与技术
    • 111 篇 控制科学与工程
    • 96 篇 材料科学与工程(可...
    • 92 篇 机械工程
    • 56 篇 软件工程
    • 33 篇 生物医学工程(可授...
    • 31 篇 环境科学与工程(可...
    • 30 篇 力学(可授工学、理...
    • 28 篇 动力工程及工程热...
    • 28 篇 安全科学与工程
    • 22 篇 建筑学
  • 256 篇 理学
    • 138 篇 数学
    • 41 篇 物理学
    • 40 篇 生物学
  • 250 篇 法学
    • 160 篇 政治学
    • 46 篇 社会学
    • 22 篇 法学
  • 207 篇 医学
    • 187 篇 临床医学
  • 172 篇 经济学
    • 146 篇 应用经济学
    • 28 篇 理论经济学
  • 139 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 22 篇 公共管理
  • 40 篇 教育学
  • 36 篇 文学
  • 27 篇 农学
  • 26 篇 艺术学
    • 23 篇 设计学(可授艺术学...
  • 7 篇 历史学
  • 5 篇 哲学
  • 3 篇 军事学

主题

  • 2,310 篇 security
  • 95 篇 privacy
  • 92 篇 network
  • 73 篇 food
  • 70 篇 system
  • 65 篇 authentication
  • 61 篇 of
  • 60 篇 and
  • 59 篇 internet
  • 55 篇 information
  • 50 篇 blockchain
  • 44 篇 网络安全
  • 43 篇 management
  • 37 篇 encryption
  • 37 篇 安全解决方案
  • 36 篇 internet of thin...
  • 36 篇 social
  • 36 篇 data
  • 35 篇 point
  • 34 篇 check

机构

  • 8 篇 department of co...
  • 6 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 西安电子科技大学
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 山东大学
  • 3 篇 mathematics depa...

作者

  • 9 篇 china
  • 8 篇 abdelwahed motwa...
  • 7 篇 sanjeev kumar
  • 7 篇 mesfer al duhayy...
  • 7 篇 arif sari
  • 6 篇 anwer mustafa hi...
  • 6 篇 夏治强
  • 5 篇 kang baoyuan
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 fatma s.alrayes
  • 4 篇 mohammed rizwanu...
  • 4 篇 sasith m. rajaso...
  • 4 篇 吴敌
  • 4 篇 manar ahmed hamz...

语言

  • 1,370 篇 英文
  • 940 篇 中文
检索条件"主题词=Security"
2310 条 记 录,以下是1-10 订阅
排序:
A genetic solution for the global food Security crisis
收藏 引用
Journal of Integrative Plant Biology 2023年 第6期65卷 1359-1361页
作者: Sunil K.Sahu Huan Liu State Key Laboratory of Agricultural Genomics BGI‐ShenzhenShenzhen518083China College of Life Sciences University of Chinese Academy of SciencesBeijing100049China
Due to the rapid increase in population and the decreasing availability of arable land and freshwater resources per capita,global crop production will need to double by 2050 to meet human food demand.In early March,th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A decade of research on patterns and architectures for IoT Security
收藏 引用
CyberSecurity 2022年 第2期5卷 27-55页
作者: Tanusan Rajmohan Phu H.Nguyen Nicolas Ferry Capgemini OsloNorway SINTEF OsloNorway UniversitéCôte d’Azur I3S/INRIA KairosSophia AntipolisFrance
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-inde... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A comprehensive survey on Security issues in vehicle-to-grid networks
收藏 引用
Journal of Control and Decision 2023年 第2期10卷 150-159页
作者: Arun Sekar Rajasekaran Maria Azees Fadi Al-Turjman Department of Electronics and Communication Engineering GMR Institute of TechnologyRajamIndia Artificial Intelligence Engineering Department. Research Center for AI and IoTAI and Robotics InstituteNear East UniversityMersin 10Turkey
Vehicle to grid(V2G)is the most hopeful approach to transfer energy as well as information in the bidirectional way.V2G network is formed by electric vehicles which connect with smart metres for information and energy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Proof of Activity Protocol for IoMT Data Security
收藏 引用
Computer Systems Science & Engineering 2023年 第1期44卷 339-350页
作者: R.Rajadevi K.Venkatachalam Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash Department of Information Technology Kongu Engineering CollegeErode638060TamilnaduIndia Department of Applied Cybernetics Faculty of ScienceUniversity of Hradec KrálovéHradec Králové50003Czech Republic Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET Security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the Security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks today.In MANET,the Intrusion Detection System(IDS)is crucial because it a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 421-440页
作者: Suliman A.Alsuhibany Meznah Alquraishi Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia
Recently,with the spread of online services involving websites,attack-ers have the opportunity to expose these services to malicious actions.To protect these services,A Completely Automated Public Turing Test to Tell ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TrustControl:Trusted Private Data Usage Control Based on Security Enhanced TrustZone
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5687-5702页
作者: Hong Lei Jun Li Suozai Li Ming Huang Jieren Cheng Yirui Bai Xinman Luo Chao Liu School of Cyberspace Security(School of Cryptology) Hainan UniversityHaikou570228China SSC Holding Company Ltd. Chengmai571924China Oxford-Hainan Blockchain Research Institute Chengmai571924China China Electronics Corporation Hainan Joint Innovation Research Institute Co.Ltd Chengmai571924China School of Computer Science and Technology Hainan UniversityHaikou570228China The Blockhouse Technology Limited OxfordOX26XJUnited Kingdom
The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,indivi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design of an Information Security Service for Medical Artificial Intelligence
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 679-694页
作者: Yanghoon Kim Jawon Kim Hangbae Chang Department of Cyber Drone Bot Military Engineering Shinhan UniversityUijeongbu-si11644Gyeonggi-doKorea Department of Security Convergence Graduate SchoolChung-Ang UniversityDongjack-gu06974SeoulKorea Department of Industrial Security Chung-Ang UniversityDongjak-gu06974SeoulKorea
The medical convergence industry has gradually adopted ICT devices,which has led to legacy Security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Suc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing Blockchain Security Using Ripple Consensus Algorithm
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 4713-4726页
作者: A.Baseera Abeer Abdullah Alsadhan School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science Imam Abdulrahman Bin Faisal UniversityDammam34212Saudi Arabia
In the development of technology in various fields like big data analysis,data mining,big data,cloud computing,and blockchain technology,Security become more constrained.Blockchain is used in providing Security by enc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Networked TT&C for Mega Satellite Constellations:A Security Perspective
收藏 引用
China Communications 2022年 第9期19卷 58-76页
作者: Yafeng Zhan Guanming Zeng Xiaohan Pan Beijing National Research Center for Information Science and Technology Beijing 100084China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China
Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based app... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论