咨询与建议

限定检索结果

文献类型

  • 5,406 篇 期刊文献
  • 160 篇 会议
  • 1 册 图书

馆藏范围

  • 5,567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,070 篇 工学
    • 1,783 篇 计算机科学与技术...
    • 902 篇 网络空间安全
    • 588 篇 电子科学与技术(可...
    • 568 篇 软件工程
    • 452 篇 控制科学与工程
    • 346 篇 仪器科学与技术
    • 338 篇 机械工程
    • 322 篇 信息与通信工程
    • 157 篇 材料科学与工程(可...
    • 152 篇 电气工程
    • 123 篇 化学工程与技术
    • 81 篇 环境科学与工程(可...
    • 72 篇 光学工程
    • 63 篇 交通运输工程
    • 57 篇 水利工程
  • 1,064 篇 理学
    • 325 篇 数学
    • 282 篇 物理学
    • 97 篇 生物学
    • 81 篇 化学
    • 79 篇 大气科学
    • 73 篇 系统科学
    • 66 篇 生态学
  • 658 篇 管理学
    • 542 篇 管理科学与工程(可...
    • 62 篇 公共管理
  • 440 篇 医学
    • 304 篇 临床医学
  • 345 篇 农学
    • 115 篇 农业资源与环境
    • 111 篇 作物学
  • 218 篇 军事学
    • 212 篇 军队指挥学
  • 173 篇 经济学
    • 164 篇 应用经济学
  • 72 篇 艺术学
    • 71 篇 设计学(可授艺术学...
  • 69 篇 法学
  • 54 篇 文学
  • 43 篇 教育学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 365 篇 security
  • 170 篇 deep learning
  • 156 篇 blockchain
  • 153 篇 machine learning
  • 125 篇 internet of thin...
  • 96 篇 authentication
  • 66 篇 iot
  • 64 篇 cybersecurity
  • 61 篇 cyber security
  • 58 篇 cloud computing
  • 54 篇 network
  • 53 篇 food security
  • 51 篇 intrusion detect...
  • 45 篇 system
  • 45 篇 encryption
  • 42 篇 intrusion detect...
  • 39 篇 privacy
  • 38 篇 access control
  • 38 篇 detection
  • 38 篇 network security

机构

  • 45 篇 ieee
  • 35 篇 department of co...
  • 30 篇 shanghai institu...
  • 30 篇 state key labora...
  • 28 篇 school of cyber ...
  • 26 篇 school of cyber ...
  • 24 篇 university of ch...
  • 22 篇 department of el...
  • 21 篇 department of co...
  • 21 篇 department of co...
  • 20 篇 school of cyber ...
  • 19 篇 department of in...
  • 18 篇 department of in...
  • 17 篇 center of excell...
  • 17 篇 department of co...
  • 16 篇 security enginee...
  • 15 篇 school of cyber ...
  • 15 篇 school of cyber ...
  • 14 篇 department of el...
  • 14 篇 department of co...

作者

  • 20 篇 walid el-shafai
  • 18 篇 wei li
  • 17 篇 fathi e.abd el-s...
  • 17 篇 naglaa f.soliman
  • 15 篇 abdelwahed motwa...
  • 15 篇 yang yang
  • 15 篇 anwer mustafa hi...
  • 15 篇 hui li
  • 15 篇 mesfer al duhayy...
  • 14 篇 jianfeng ma
  • 13 篇 mehedi masud
  • 13 篇 曾贵华
  • 12 篇 jian wang
  • 12 篇 jianwei liu
  • 12 篇 rajeev kumar
  • 12 篇 yu zhang
  • 12 篇 fahd n.al-wesabi
  • 11 篇 jieren cheng
  • 11 篇 mingkwan doilom
  • 11 篇 xiaohong guan

语言

  • 5,226 篇 英文
  • 341 篇 中文
检索条件"机构=Department of Cyber Security Science"
5567 条 记 录,以下是1-10 订阅
排序:
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
收藏 引用
Computer Modeling in Engineering & sciences 2025年 第1期142卷 813-834页
作者: Chanhyeong Cho Byeori Kim Haehyun Cho Taek-Young Youn department of cyber security Dankook UniversityYongin16890Republic of Korea department of Software Soongsil UniversitySeoul07027Republic of Korea
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly ***,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Deep Synchronization Control of Grid-Forming Converters:A Reinforcement Learning Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期 273-275页
作者: Zhuorui Wu Meng Zhang Bo Fan Yang Shi Xiaohong Guan the School of cyber science and Engineering Xi'an Jiaotong University the department of Mechanical Engineering University of Victoria
Dear Editor,This letter proposes a deep synchronization control(DSC) method to synchronize grid-forming converters with power grids. The method involves constructing a novel controller for grid-forming converters base...
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
收藏 引用
science China(Information sciences) 2022年 第1期65卷 192-206页
作者: Chenyu WANG Ding WANG Guoai XU Debiao HE School of cyber security Beijing University of Posts and Telecommunications State Key Laboratory of Cryptology College of cyber science Nankai University Tianjin Key Laboratory of Network and Data security Technology Nankai University School of cyber science and Engineering Wuhan University
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrai... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel batch-based LKH tree balanced algorithm for group key management
收藏 引用
science China(Information sciences) 2017年 第10期60卷 255-257页
作者: Jie XU Linke LI Sibian LU Huayun YIN Center for cyber security School of Communication and Information EngineeringUniversity of Electronic Science and Technology of China
Logical key hierarchy(LKH)is the most suitable key management scheme for a large dynamic group[1,2].Ref.[3]proposed LKH key management scheme,but it did not discuss how to keep tree balanced when membership ***.[4]pro-
来源: 同方期刊数据库 同方期刊数据库 评论
Novel Architecture of security Orchestration, Automation and Response in Internet of Blended Environment
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 199-223页
作者: Minkyung Lee Julian Jang-Jaccard Jin Kwak ISAA Lab Department of Cyber SecurityAjou UniversitySuwon16499Korea department of Computer science and Information Technology Massey UniversityAuckland0745New Zealand department of cyber security Ajou UniversitySuwon16499Korea
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent *** technologies are used in diverse environments,such... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning
收藏 引用
Computer Modeling in Engineering & sciences 2019年 第7期120卷 1-23页
作者: Jin Yang Tao Li Gang Liang Wenbo He Yue Zhao College of cyber security Department of Computing and SoftwareSichuan UniversityChengduChina McMaster University Science and Technology on Communication Security LaboratoryCanada science and Technology on Communication security Laboratory ChengduChina
Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion *** this paper,as enlightened by the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fuzzy Clustering with the Structural α-Entropy
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1118-1125页
作者: LI Kai GAO Yan School of cyber security and Computer Hebei University
We study fuzzy clustering with the structural α-entropy and present a unified framework for fuzzy clustering with fuzzy entropy, which can be regarded fuzzy clustering with fuzzy entropy as its special case. Then,aim... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Specific Emitter Identification Based on Visibility Graph Entropy
收藏 引用
Chinese Physics Letters 2018年 第3期35卷 9-13页
作者: 朱胜利 甘露 Center for cyber security School of Electronic Engineering University of Electronic Science and Technology of China
The specific emitter identification (SEI) technique some external feature measurements of the signal. determines the unique emitter of a given signal by using It has recently attracted a great deal of attention beca... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ePUF: A Lightweight Double Identity Verification in IoT
收藏 引用
Tsinghua science and Technology 2020年 第5期25卷 625-635页
作者: Bo Zhao Pengyuan Zhao Peiru Fan the School of cyber science and Engineering Wuhan UniversityWuhan 430072China the School of cyber security and Computer Hebei UniversityBaoding 071002China
Remote authentication is a safe and verifiable *** the Internet of Things (loT),remote hosts need to verify the legitimacy of identity of terminal ***,embedded devices can hardly afford sufficient resources for the ne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN department of Information science and Technology Jinan UniversityGuangzhou 510632China department of cyber security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring *** particular,if the data system of acquired enterprise contains a searchable encryption mechan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论