咨询与建议

限定检索结果

文献类型

  • 889 篇 期刊文献
  • 24 篇 会议

馆藏范围

  • 913 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 755 篇 工学
    • 366 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 156 篇 控制科学与工程
    • 132 篇 网络空间安全
    • 97 篇 电子科学与技术(可...
    • 79 篇 机械工程
    • 60 篇 仪器科学与技术
    • 45 篇 信息与通信工程
    • 41 篇 电气工程
    • 20 篇 交通运输工程
    • 11 篇 航空宇航科学与技...
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 9 篇 公安技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 建筑学
    • 7 篇 生物工程
    • 6 篇 生物医学工程(可授...
  • 144 篇 管理学
    • 138 篇 管理科学与工程(可...
  • 112 篇 理学
    • 52 篇 数学
    • 24 篇 系统科学
    • 17 篇 物理学
    • 8 篇 生物学
  • 61 篇 医学
    • 49 篇 临床医学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 18 篇 文学
    • 15 篇 外国语言文学
  • 14 篇 农学
    • 6 篇 作物学
  • 14 篇 艺术学
    • 14 篇 设计学(可授艺术学...
  • 10 篇 军事学
    • 9 篇 军队指挥学
  • 8 篇 教育学
    • 5 篇 教育学
  • 5 篇 法学

主题

  • 69 篇 machine learning
  • 49 篇 cybersecurity
  • 48 篇 deep learning
  • 46 篇 security
  • 41 篇 cyber security
  • 40 篇 blockchain
  • 35 篇 internet of thin...
  • 31 篇 artificial intel...
  • 22 篇 cyber-physical s...
  • 19 篇 industry 4.0
  • 16 篇 iot
  • 16 篇 cloud computing
  • 16 篇 privacy
  • 15 篇 intrusion detect...
  • 13 篇 cyber-physical s...
  • 13 篇 smart grid
  • 12 篇 anomaly detectio...
  • 12 篇 system
  • 11 篇 cyber
  • 11 篇 internet of thin...

机构

  • 26 篇 ieee
  • 10 篇 school of comput...
  • 8 篇 riphah school of...
  • 8 篇 department of in...
  • 7 篇 department of co...
  • 6 篇 school of cyber ...
  • 6 篇 department of cy...
  • 6 篇 school of inform...
  • 5 篇 department of in...
  • 5 篇 school of cyber ...
  • 5 篇 department of in...
  • 4 篇 school of comput...
  • 4 篇 department of in...
  • 4 篇 pattern recognit...
  • 4 篇 china industrial...
  • 4 篇 school of automa...
  • 4 篇 school of cyber ...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 department of co...

作者

  • 19 篇 kim-kwang raymon...
  • 13 篇 taher m.ghazal
  • 10 篇 fei-yue wang
  • 10 篇 muhammad adnan k...
  • 8 篇 sagheer abbas
  • 7 篇 munir ahmad
  • 7 篇 raees ahmad khan
  • 6 篇 jin kwak
  • 6 篇 fei gao
  • 6 篇 mohammad kamrul ...
  • 6 篇 zheng yan
  • 6 篇 alka agrawal
  • 6 篇 qing-shan jia
  • 5 篇 jung taek seo
  • 5 篇 hao zhang
  • 5 篇 rajeev kumar
  • 5 篇 arun kumar sivar...
  • 5 篇 sadeeq jan
  • 5 篇 bo chen
  • 5 篇 manar ahmed hamz...

语言

  • 868 篇 英文
  • 45 篇 中文
检索条件"机构=Department of Cyber Leadership"
913 条 记 录,以下是1-10 订阅
排序:
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第1期142卷 813-834页
作者: Chanhyeong Cho Byeori Kim Haehyun Cho Taek-Young Youn department of cyber Security Dankook UniversityYongin16890Republic of Korea department of Software Soongsil UniversitySeoul07027Republic of Korea
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly ***,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cloud Computing: Purpose and Future
收藏 引用
Journal of Software Engineering and Applications 2024年 第10期17卷 763-769页
作者: Robb Shawe department of cyber leadership Capitol Technology University Laurel MD USA
Cloud computing is the new norm within business entities as businesses try to keep up with technological advancements and user needs. The concept is defined as a computing environment allowing for remote outsourcing o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 199-223页
作者: Minkyung Lee Julian Jang-Jaccard Jin Kwak ISAA Lab Department of Cyber SecurityAjou UniversitySuwon16499Korea department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand department of cyber Security Ajou UniversitySuwon16499Korea
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent *** technologies are used in diverse environments,such... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第12期141卷 1911-1931页
作者: Chan Hyeong Cho Hyun Min Song Taek-Young Youn department of cyber Security Dankook UniversityYonginGyeonggi-Do16890Republic of Korea
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable *** paper proposes a novel system for encrypting personal information within recorded surv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 1-12页
作者: WANG Zhibo LIU Kaixin HU Jiahui REN Ju GUO Hengchang YUAN Wei School of cyber Science and Engineering Wuhan University School of cyber Science and Technology Zhejiang University department of Computer Science and Technology Tsinghua University
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN department of Information Science and Technology Jinan UniversityGuangzhou 510632China department of cyber Security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring *** particular,if the data system of acquired enterprise contains a searchable encryption mechan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 231-233页
作者: Haiqin WU Liangmin WANG Tao JIANG department of Computer Science and Communication Engineering Jiangsu University School of cyber Engineering Xidian University
Dear editor,Recently,due to the proliferation of location-aware mobile devices,k nearest neighbor query(k NN)has become increasing popular in location-based services,especially in outsourced environments where data ow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Utilizing blockchains in opportunistic networks for integrity and confidentiality
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 31-38页
作者: Samaneh Rashidibajgan Thomas Hupperich cyber Security Department of Information SystemsUniversity of Münster80539 MünsterGermany
Opportunistic networks(OppNets)are usually a set of smart,wearable,and portable devices or entities with mobility that connect wirelessly without requiring *** a network is of great importance in data transmission,par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Contour detection with bicubic spline surfaces
收藏 引用
International Journal of Digital Earth 2023年 第1期16卷 1801-1827页
作者: Hiroyuki Goto Taiki Otsuka department of Industrial and Systems Engineering Hosei UniversityTokyoJapan Faculty of IT and Business Cyber UniversityTokyoJapan
Contour detection has a rich history in multiplefields such as geography,engineering,and earth *** predominant approach is based on piecewise planar tessellation and now being challenged concerning the extraction of c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
Science China(Information Sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of cyber Engineering Xidian University School of Computer Science and Technology Xidian University department of Computer and Information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论