咨询与建议

限定检索结果

文献类型

  • 2,837 篇 期刊文献
  • 167 篇 会议
  • 1 册 图书

馆藏范围

  • 3,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,691 篇 工学
    • 2,129 篇 计算机科学与技术...
    • 795 篇 电气工程
    • 761 篇 电子科学与技术(可...
    • 684 篇 信息与通信工程
    • 586 篇 软件工程
    • 546 篇 控制科学与工程
    • 507 篇 网络空间安全
    • 451 篇 材料科学与工程(可...
    • 323 篇 生物医学工程(可授...
    • 268 篇 机械工程
    • 257 篇 力学(可授工学、理...
    • 219 篇 仪器科学与技术
    • 72 篇 安全科学与工程
    • 67 篇 环境科学与工程(可...
  • 1,337 篇 理学
    • 892 篇 数学
    • 279 篇 生物学
    • 160 篇 物理学
    • 104 篇 系统科学
    • 89 篇 统计学(可授理学、...
    • 59 篇 天文学
  • 547 篇 管理学
    • 452 篇 管理科学与工程(可...
    • 81 篇 图书情报与档案管...
  • 292 篇 医学
    • 262 篇 临床医学
    • 124 篇 基础医学(可授医学...
  • 135 篇 法学
    • 81 篇 社会学
  • 118 篇 教育学
    • 69 篇 心理学(可授教育学...
    • 53 篇 教育学
  • 100 篇 军事学
    • 93 篇 军队指挥学
  • 96 篇 农学
    • 54 篇 作物学
  • 90 篇 经济学
    • 86 篇 应用经济学
  • 60 篇 文学
  • 52 篇 艺术学
  • 1 篇 哲学

主题

  • 223 篇 security
  • 169 篇 machine learning
  • 158 篇 deep learning
  • 117 篇 blockchain
  • 96 篇 internet of thin...
  • 84 篇 cloud computing
  • 68 篇 authentication
  • 63 篇 privacy
  • 58 篇 artificial intel...
  • 57 篇 iot
  • 50 篇 cryptography
  • 46 篇 encryption
  • 35 篇 clustering
  • 35 篇 optimization
  • 35 篇 wireless sensor ...
  • 35 篇 data
  • 34 篇 network
  • 33 篇 cybersecurity
  • 33 篇 information secu...
  • 33 篇 network security

机构

  • 43 篇 department of co...
  • 28 篇 department of co...
  • 25 篇 department of co...
  • 24 篇 department of in...
  • 22 篇 department of co...
  • 20 篇 department of el...
  • 20 篇 department of in...
  • 17 篇 ieee
  • 14 篇 department of in...
  • 14 篇 security enginee...
  • 14 篇 department of co...
  • 13 篇 department of in...
  • 13 篇 department of lo...
  • 13 篇 department of co...
  • 12 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 security enginee...
  • 11 篇 department of co...
  • 11 篇 department of ma...
  • 11 篇 department of co...

作者

  • 32 篇 walid el-shafai
  • 24 篇 mesfer al duhayy...
  • 21 篇 manar ahmed hamz...
  • 19 篇 abdelwahed motwa...
  • 19 篇 anwer mustafa hi...
  • 19 篇 fahd n.al-wesabi
  • 19 篇 naglaa f.soliman
  • 18 篇 fathi e.abd el-s...
  • 17 篇 e.laxmi lydia
  • 17 篇 denis a.pustokhi...
  • 17 篇 irina v.pustokhi...
  • 16 篇 muhammad shafiq
  • 16 篇 muhammad attique...
  • 15 篇 mehedi masud
  • 15 篇 raees ahmad khan
  • 14 篇 ishfaq yaseen
  • 14 篇 usman tariq
  • 13 篇 kim-kwang raymon...
  • 13 篇 muhammad adnan k...
  • 13 篇 ashit kumar dutt...

语言

  • 2,968 篇 英文
  • 37 篇 中文
检索条件"机构=Computer Science and Information Security Management Department"
3005 条 记 录,以下是1-10 订阅
排序:
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1635-1654页
作者: Shahad Alzahrani Hatim Alsuwat Emad Alsuwat Independent Researcher Specializing in Data security and Privacy Taif26571Saudi Arabia department of computer science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah24382Saudi Arabia department of computer science College of Computers and Information TechnologyTaif UniversityTaif26571Saudi Arabia
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of computer science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and information security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of Cyber Engineering Xidian University School of computer science and Technology Xidian University department of computer and information science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and information management Division Beijing Electronic Science and Technology InstituteBeijing100070China department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2245-2267页
作者: Ashraf S.Mashaleh Noor Farizah Binti Ibrahim Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh School of computer sciences Universiti Sains MalaysiaPenangMalaysia department computer Center Al-Balqa Applied UniversitySaltJordan department of information security Faculty of Information TechnologyUniversity of PetraAmmanJordan department of computer science Tafila Technical UniversityTafilaJordan College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education department of computer and Software Nanjing University of Information Science and Technology School of management Nanjing University of Posts and Telecommunications department of computer science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo School of computer and Software Nanjing University of Information Science and TechnologyNanjing210044China department of computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China department of information Systems and Cyber security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4491-4512页
作者: Chunhui Li Hua Jiang School of computer and Electronic information Guangxi UniversityNanning530000China Cyber security and information Center Guangxi UniversityNanning530000China
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of *** systems spanning various sectors of enterprises geographically dispersed,the necessit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi department of computer science Alhamd Islamic UniversityIslamabad44000Pakistan department of computer science and Technology University of Science and Technology BeijingBeijing100083China department of computer science National University of TechnologyIslamabad44000Pakistan department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan department of computer science and information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia department of computer science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia department of information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia department of Natural and Applied sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31department of computer science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan department of computer science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan department of computer science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia department of computer information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia department of computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia department of computer science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论