咨询与建议

限定检索结果

文献类型

  • 787 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 669 篇 工学
    • 352 篇 计算机科学与技术...
    • 152 篇 网络空间安全
    • 134 篇 软件工程
    • 104 篇 控制科学与工程
    • 86 篇 电子科学与技术(可...
    • 59 篇 仪器科学与技术
    • 58 篇 机械工程
    • 49 篇 信息与通信工程
    • 24 篇 电气工程
    • 17 篇 交通运输工程
    • 15 篇 航空宇航科学与技...
    • 8 篇 光学工程
    • 7 篇 动力工程及工程热...
    • 6 篇 测绘科学与技术
    • 6 篇 化学工程与技术
    • 6 篇 农业工程
    • 5 篇 公安技术
  • 137 篇 管理学
    • 127 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 95 篇 理学
    • 36 篇 数学
    • 24 篇 物理学
    • 7 篇 系统科学
    • 6 篇 化学
    • 6 篇 地球物理学
  • 41 篇 医学
    • 35 篇 临床医学
  • 22 篇 军事学
    • 21 篇 军队指挥学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 农学
    • 11 篇 农业资源与环境
  • 14 篇 艺术学
    • 14 篇 设计学(可授艺术学...
  • 9 篇 文学
    • 8 篇 外国语言文学
  • 8 篇 法学
  • 7 篇 教育学

主题

  • 61 篇 security
  • 58 篇 machine learning
  • 44 篇 cybersecurity
  • 43 篇 cyber security
  • 41 篇 blockchain
  • 31 篇 deep learning
  • 28 篇 internet of thin...
  • 24 篇 artificial intel...
  • 21 篇 cloud computing
  • 17 篇 iot
  • 17 篇 privacy
  • 14 篇 encryption
  • 13 篇 authentication
  • 13 篇 intrusion detect...
  • 13 篇 network security
  • 11 篇 network
  • 11 篇 cryptography
  • 10 篇 intrusion detect...
  • 10 篇 anomaly detectio...
  • 10 篇 system

机构

  • 11 篇 school of cyber ...
  • 10 篇 school of comput...
  • 10 篇 department of co...
  • 9 篇 ieee
  • 8 篇 riphah school of...
  • 8 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 institute of inf...
  • 6 篇 department of cy...
  • 6 篇 school of inform...
  • 5 篇 department of in...
  • 5 篇 school of cyber ...
  • 5 篇 department of in...
  • 4 篇 china industrial...
  • 4 篇 department of in...
  • 4 篇 department of el...
  • 4 篇 pattern recognit...
  • 4 篇 department of co...
  • 4 篇 state key labora...
  • 4 篇 department of in...

作者

  • 19 篇 kim-kwang raymon...
  • 13 篇 taher m.ghazal
  • 10 篇 muhammad adnan k...
  • 7 篇 sagheer abbas
  • 7 篇 munir ahmad
  • 7 篇 raees ahmad khan
  • 6 篇 jin kwak
  • 6 篇 mohammad kamrul ...
  • 6 篇 alka agrawal
  • 5 篇 jung taek seo
  • 5 篇 rajeev kumar
  • 5 篇 sadeeq jan
  • 5 篇 zheng yan
  • 5 篇 guangjun liang
  • 4 篇 abu sarwar zaman...
  • 4 篇 abdelwahed motwa...
  • 4 篇 hussam al hamadi
  • 4 篇 jawad ahmad
  • 4 篇 sanjeev kumar
  • 4 篇 fei-yue wang

语言

  • 761 篇 英文
  • 40 篇 中文
检索条件"机构=Department of Cyber Space Security"
801 条 记 录,以下是1-10 订阅
排序:
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第1期142卷 813-834页
作者: Chanhyeong Cho Byeori Kim Haehyun Cho Taek-Young Youn department of cyber security Dankook UniversityYongin16890Republic of Korea department of Software Soongsil UniversitySeoul07027Republic of Korea
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly ***,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 73-102页
作者: Zhimao Lai Saad Arif Cong Feng Guangjun Liao Chuntao Wang School of Automation Guangdong University and TechnologyGuangzhou510006China School of Immigration Administration(Guangzhou) China People’s Police UniversityGuangzhou510663China department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl Ahsa31982Saudi Arabia cyber Police Division Guangzhou Public Security BureauGuangzhou510030China School of Forensic Science and Technology Guangdong Police CollegeGuangzhou510320China College of Mathematics and Informatics South China Agricultural UniversityGuangzhou510642China
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly *** paper ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第12期141卷 1911-1931页
作者: Chan Hyeong Cho Hyun Min Song Taek-Young Youn department of cyber security Dankook UniversityYonginGyeonggi-Do16890Republic of Korea
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable *** paper proposes a novel system for encrypting personal information within recorded surv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Novel Architecture of security Orchestration, Automation and Response in Internet of Blended Environment
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 199-223页
作者: Minkyung Lee Julian Jang-Jaccard Jin Kwak ISAA Lab Department of Cyber SecurityAjou UniversitySuwon16499Korea department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand department of cyber security Ajou UniversitySuwon16499Korea
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent *** technologies are used in diverse environments,such... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Impact Analysis of Resilience Against Malicious Code Attacks via Emails
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4803-4816页
作者: Chulwon Lee Kyungho Lee department of Information security Korea UniversitySeoul02841Korea Institute of cyber security&Privacy Korea UniversitySeoul02841Korea
The damage caused by malicious software is increasing owing to the COVID-19 pandemic,such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infra... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
收藏 引用
Frontiers of Computer Science 2023年 第5期17卷 165-177页
作者: Jianwei LI Xiaoming WANG Qingqing GAN department of Information Science and Technology Jinan UniversityGuangzhou 510632China department of cyber security Guangdong University of Foreign StudiesGuangzhou 510006China
When one enterprise acquires another,the electronic data of the acquired enterprise will be transferred to the acquiring *** particular,if the data system of acquired enterprise contains a searchable encryption mechan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Utilizing blockchains in opportunistic networks for integrity and confidentiality
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 31-38页
作者: Samaneh Rashidibajgan Thomas Hupperich cyber security Department of Information SystemsUniversity of Münster80539 MünsterGermany
Opportunistic networks(OppNets)are usually a set of smart,wearable,and portable devices or entities with mobility that connect wirelessly without requiring *** a network is of great importance in data transmission,par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2019年 第7期120卷 1-23页
作者: Jin Yang Tao Li Gang Liang Wenbo He Yue Zhao College of cyber security Department of Computing and SoftwareSichuan UniversityChengduChina McMaster University Science and Technology on Communication Security LaboratoryCanada Science and Technology on Communication security Laboratory ChengduChina
Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion *** this paper,as enlightened by the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly
收藏 引用
Computer Systems Science & Engineering 2023年 第8期46卷 2091-2107页
作者: Seog Chung Seo HeeSeok Kim department of Financial Information security Kookmin UniversitySeoul02707Korea department of cyber security College of Science and TechnologyKorea UniversitySejong30019Korea
With the rapid development of quantum computers capable of realizing Shor’s algorithm,existing public key-based algorithms face a significant security ***-Kyber has been selected as the only key encapsulation mechani... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 20-33页
作者: Chao LIN Debiao HE Sherali ZEADALLY Neeraj KUMAR Kim-Kwang Raymond CHOO Key Laboratory of Aerospace Information security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University State Key Laboratory of Cryptology College of Communication and Information University of Kentucky department of Computer Science and Engineering Thapar University department of Information Systems and cyber security and department of Electrical and Computer Engineering University of Texas at San Antonio
A robust and scalable crowd management infrastructure is crucial in addressing operational challenges when deploying high-density sensors and actuators in a smart city. While crowdsourcing is widely used in crowd mana... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论