咨询与建议

限定检索结果

文献类型

  • 3,729 篇 期刊文献
  • 161 篇 会议

馆藏范围

  • 3,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,313 篇 工学
    • 2,286 篇 计算机科学与技术...
    • 893 篇 电子科学与技术(可...
    • 871 篇 电气工程
    • 841 篇 信息与通信工程
    • 782 篇 控制科学与工程
    • 669 篇 软件工程
    • 627 篇 材料科学与工程(可...
    • 627 篇 网络空间安全
    • 404 篇 机械工程
    • 307 篇 生物医学工程(可授...
    • 303 篇 仪器科学与技术
    • 289 篇 力学(可授工学、理...
    • 92 篇 环境科学与工程(可...
    • 70 篇 动力工程及工程热...
  • 1,964 篇 理学
    • 1,123 篇 数学
    • 394 篇 物理学
    • 334 篇 生物学
    • 198 篇 系统科学
    • 182 篇 天文学
    • 142 篇 统计学(可授理学、...
    • 110 篇 化学
    • 67 篇 地球物理学
  • 673 篇 管理学
    • 526 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
  • 340 篇 医学
    • 293 篇 临床医学
    • 121 篇 基础医学(可授医学...
  • 159 篇 军事学
    • 148 篇 军队指挥学
  • 149 篇 法学
    • 82 篇 社会学
  • 133 篇 农学
  • 116 篇 经济学
    • 113 篇 应用经济学
  • 96 篇 教育学
    • 65 篇 心理学(可授教育学...
  • 49 篇 艺术学
  • 44 篇 文学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 283 篇 security
  • 151 篇 deep learning
  • 120 篇 blockchain
  • 120 篇 machine learning
  • 90 篇 internet of thin...
  • 75 篇 authentication
  • 72 篇 privacy
  • 70 篇 cryptography
  • 58 篇 iot
  • 58 篇 cloud computing
  • 54 篇 convergence
  • 52 篇 encryption
  • 49 篇 information secu...
  • 48 篇 optimization
  • 46 篇 cybersecurity
  • 44 篇 intrusion detect...
  • 41 篇 artificial intel...
  • 39 篇 network
  • 36 篇 information
  • 36 篇 data

机构

  • 33 篇 ieee
  • 33 篇 department of co...
  • 24 篇 department of co...
  • 22 篇 department of co...
  • 21 篇 department of in...
  • 20 篇 department of in...
  • 20 篇 department of el...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 department of ma...
  • 14 篇 security enginee...
  • 14 篇 department of in...
  • 14 篇 department of co...
  • 13 篇 department of el...
  • 13 篇 state key labora...
  • 13 篇 department of ic...
  • 12 篇 department of co...
  • 11 篇 security enginee...
  • 11 篇 department of au...
  • 11 篇 department of el...

作者

  • 34 篇 walid el-shafai
  • 25 篇 yunyoung nam
  • 19 篇 fathi e.abd el-s...
  • 18 篇 abdelwahed motwa...
  • 18 篇 kim-kwang raymon...
  • 17 篇 manar ahmed hamz...
  • 17 篇 naglaa f.soliman
  • 15 篇 anwer mustafa hi...
  • 15 篇 gyanendra prasad...
  • 15 篇 mesfer al duhayy...
  • 14 篇 fahd n.al-wesabi
  • 14 篇 muhammad attique...
  • 13 篇 mehedi masud
  • 13 篇 raees ahmad khan
  • 12 篇 rajeev kumar
  • 12 篇 ishfaq yaseen
  • 12 篇 e.laxmi lydia
  • 12 篇 usman tariq
  • 12 篇 alka agrawal
  • 11 篇 jae su yu

语言

  • 3,843 篇 英文
  • 47 篇 中文
检索条件"机构=Department of Convergence Information Security"
3890 条 记 录,以下是1-10 订阅
排序:
Malware Detection Using Dual Siamese Network Model
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 563-584页
作者: ByeongYeol An JeaHyuk Yang Seoyeon Kim Taeguen Kim department of Software convergence Soonchunhyang UniversityAsan31538Republic of Korea department of Mobility convergence security Soonchunhyang UniversityAsan31538Republic of Korea department of information security Engineering Soonchunhyang UniversityAsan31538Republic of Korea
This paper proposes a new approach to counter cyberattacks using the increasingly diverse malware in cyber *** signature detection methods that utilize static and dynamic features face limitations due to the continuou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第8期140卷 1669-1687页
作者: So-Eun Jeon Ye-Sol Oh Yeon-Ji Lee Il-Gu Lee department of Future convergence Technology Engineering Sungshin Women’s UniversitySeoul02844Korea department of convergence security Engineering SungshinWomen’s UniversitySeoul02844Korea
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly *** signature-based detecti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ag-integrated mixed metallic Co-Fe-Ni-Mn hydroxide composite as advanced electrode for high-performance hybrid supercapacitors
收藏 引用
Journal of Energy Chemistry 2024年 第1期88卷 579-591,I0013页
作者: Anki Reddy Mule Bhimanaboina Ramulu Shaik Junied Arbaz Anand Kurakula Jae Su Yu department of Electronics and information convergence Engineering Institute for Wearable Convergence ElectronicsKyung Hee UniversityYongin-siGyeonggi-do 17104Republic of Korea
Direct growth of redox-active noble metals and rational design of multifunctional electrochemical active materials play crucial roles in developing novel electrode materials for energy storage *** this regard,silver(A... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim department of Financial information security Kookmin UniversitySeoul02707Republic of Korea department of information security Cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 545-561页
作者: Yongjin Jeon Seungjun Baek Jongsung Kim department of Financial information security Kookmin UniversitySeoul02707Republic of Korea
Quantum computers accelerate many algorithms based on the superposition principle of quantum *** Grover algorithm provides significant performance to malicious users attacking symmetric key *** the performance of atta... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Dragonfly Interaction Algorithm for Optimization of Queuing Delay in Industrial Wireless Networks
收藏 引用
Journal of Bionic Engineering 2024年 第1期21卷 447-485页
作者: Sanjay Bhardwaj Da-Hye Kim Dong-Seong Kim department of IT convergence Engineering ICT Convergence Research CenterKumoh National Institute of TechnologyGumiSouth Korea
In industrial wireless networks,data transmitted from source to destination are highly *** often leads to the queuing of the data,and poor management of the queued data results in excessive delays,increased energy con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Comprehensive Survey on Federated Learning in the Healthcare Area: Concept and Applications
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2239-2274页
作者: Deepak Upreti Eunmok Yang Hyunil Kim Changho Seo department of convergence Science Kongju National UniversityChungcheongnam-doGongju-si32588South Korea department of information security Cryptologyand MathematicsKookmin UniversitySeoul02707South Korea department of information and Communication Engineering Chosun UniversityGwangju61452South Korea Basic Science Research Institution Kongju National UniversityChungcheongnam-doGongju-si32588South Korea
Federated learning is an innovative machine learning technique that deals with centralized data storage issues while maintaining privacy and *** involves constructing machine learning models using datasets spread acro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Air-stable,all-dry transferred ReS_(2)/GaSe heterostructure-based NO_(2)gas sensor
收藏 引用
Journal of Materials Science & Technology 2024年 第1期168卷 79-87页
作者: A.Venkatesan Hyeyoon Ryu Anupom Devnath Hyungyu Yoo Seunghyun Lee department of Electronic Engineering Kyung Hee UniversityYongin-Si 17104South Korea department of Electronics and information convergence Engineering Kyung Hee UniversityYongin-Si 17104South Korea
Two-dimensional(2D)materials have gained considerable attention in chemical sensing owing to their naturally high surface-to-volume ***,the poor response time and incomplete recovery re-strict their application in pra... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Framework for Software Vulnerability Detection Based on an Advanced Computing
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3699-3723页
作者: Bui Van Cong Cho Do Xuan department of information Technology University of Economics and Technical IndustriesHanoi100000Vietnam Faculty of information security Posts and Telecommunications Institute of TechnologyHanoi100000Vietnam
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest *** paper proposes a new framework called DrCSE to improve software vulnerability *** uses an intelligent c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
MV-Honeypot:security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 655-669页
作者: Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park SysCore Lab.(convergence Engineering for Intelligent Drone) Sejong UniversitySeoul05006Republic of Korea Division of Computer Engineering Hankuk University of Foreign StudiesYongin-si17035Republic of Korea department of information security Sejong UniversitySeoul05006Republic of Korea
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论