咨询与建议

限定检索结果

文献类型

  • 264 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 267 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 214 篇 计算机科学与技术...
    • 67 篇 控制科学与工程
    • 52 篇 电子科学与技术(可...
    • 50 篇 网络空间安全
    • 48 篇 材料科学与工程(可...
    • 48 篇 信息与通信工程
    • 39 篇 软件工程
    • 30 篇 电气工程
    • 25 篇 生物医学工程(可授...
    • 19 篇 力学(可授工学、理...
    • 13 篇 机械工程
    • 7 篇 安全科学与工程
    • 6 篇 仪器科学与技术
    • 4 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
  • 90 篇 理学
    • 52 篇 数学
    • 32 篇 生物学
    • 12 篇 系统科学
    • 8 篇 物理学
    • 5 篇 统计学(可授理学、...
  • 33 篇 管理学
    • 27 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
  • 19 篇 医学
    • 18 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 16 篇 法学
    • 9 篇 法学
    • 6 篇 社会学
  • 12 篇 文学
    • 10 篇 外国语言文学
  • 10 篇 教育学
    • 6 篇 心理学(可授教育学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
    • 4 篇 作物学

主题

  • 80 篇 cybersecurity
  • 47 篇 deep learning
  • 43 篇 machine learning
  • 20 篇 security
  • 15 篇 intrusion detect...
  • 12 篇 blockchain
  • 12 篇 artificial intel...
  • 12 篇 feature selectio...
  • 11 篇 intrusion detect...
  • 10 篇 iot
  • 10 篇 network security
  • 9 篇 internet of thin...
  • 9 篇 cloud computing
  • 8 篇 anomaly detectio...
  • 8 篇 classification
  • 7 篇 vulnerability
  • 7 篇 cyber security
  • 7 篇 malware detectio...
  • 6 篇 metaheuristics
  • 5 篇 industry 4.0

机构

  • 12 篇 department of in...
  • 11 篇 department of co...
  • 7 篇 department of cy...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of in...
  • 5 篇 information tech...
  • 5 篇 department of el...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 saudi aramco cyb...
  • 4 篇 department of cy...
  • 4 篇 mathematics depa...
  • 4 篇 department of in...
  • 3 篇 research centre ...
  • 3 篇 security enginee...
  • 3 篇 information syst...
  • 3 篇 department of in...
  • 3 篇 department of in...

作者

  • 11 篇 abdelwahed motwa...
  • 11 篇 mesfer al duhayy...
  • 8 篇 manar ahmed hamz...
  • 6 篇 mohamed k.nour
  • 6 篇 radwa marzouk
  • 6 篇 anwer mustafa hi...
  • 6 篇 mahmoud ragab
  • 6 篇 mohammed maray
  • 6 篇 abdullah mohamed
  • 5 篇 saud s.alotaibi
  • 5 篇 heba g.mohamed
  • 5 篇 hamed alqahtani
  • 4 篇 abu sarwar zaman...
  • 4 篇 fatma s.alrayes
  • 4 篇 haya mesfer alsh...
  • 4 篇 sana alazwari
  • 4 篇 walid el-shafai
  • 4 篇 faisal s.alsubae...
  • 4 篇 jaber s.alzahran...
  • 4 篇 chris p. tsokos

语言

  • 257 篇 英文
  • 10 篇 中文
检索条件"机构=Department of Cybersecurity"
267 条 记 录,以下是1-10 订阅
排序:
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2449-2463页
作者: Maher Alharby cybersecurity department College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fake News Detection Using Machine Learning and Deep Learning Methods
收藏 引用
Computers, Materials & Continua 2023年 第11期77卷 2079-2096页
作者: Ammar Saeed Eesa Al Solami department of Computer Science Comsats University IslamabadWah Cantt47010Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia
The evolution of the internet and its accessibility in the twenty-first century has resulted in a tremendous increase in the use of social media platforms.Some social media sources contribute to the propagation of fak... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
MBB-IoT:Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 2095-2119页
作者: Yi Qing Xiangyu Liu Yanhui Du department of Artificial Intelligence People’s Public Security University of ChinaBeijing100038China Department of Cybersecurity People’s Public Security University of ChinaBeijing100038China
Distributed Denial of Service(DDoS)attacks have always been a major concern in the security field.With the release of malware source codes such as BASHLITE and Mirai,Internet of Things(IoT)devices have become the new ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1585-1601页
作者: Ahmed S.Alghamdi Surayya Naz Ammar Saeed Eesa Al Solami Muhammad Kamran Mohammed Saeed Alkatheiri Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahKSA Abdul Wali Khan University MardanPakistan department of Computer Science COMSATS University IslamabadWah CampusWah CanttPakistan
With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A systematic review:Detecting phishing websites using data mining models
收藏 引用
Intelligent and Converged Networks 2023年 第4期4卷 326-341页
作者: Dina Jibat Sarah Jamjoom Qasem Abu Al-Haija Abdallah Qusef the department of Business Intelligence Technology Princess Sumaya University for TechnologyAmman 11941Jordan the Department of Cybersecurity Princess Sumaya University for TechnologyAmman 11941Jordan the department of Software Engineering Princess Sumaya University for TechnologyAmman 11941Jordan
As internet technology use is on the rise globally,phishing constitutes a considerable share of the threats that may attack individuals and organizations,leading to significant losses from personal and confidential in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Recent advances in mobile edge computing and content caching
收藏 引用
Digital Communications and Networks 2020年 第2期6卷 189-194页
作者: Sunitha Safavat Naveen Naik Sapavath Danda B.Rawat Data Science and cybersecurity Center(DSC2) Department of Electrical Engineering and Computer ScienceHoward UniversityWashingtonDC20059USA
The demand for digital media services is increasing as the number of wireless subscriptions is growing exponentially.In order to meet this growing need,mobile wireless networks have been advanced at a tremendous pace ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A channel state information based virtual MAC spoofing detector
High-Confidence Computing
收藏 引用
High-Confidence Computing 2022年 第3期2卷 1-6页
作者: Peng Jiang Hongyi Wu Chunsheng Xin department of ECE Old Dominion UniversityNorfolkVAUSA School of cybersecurity Old Dominion UniversityNorfolkVAUSA
Physical layer security has attracted lots of attention with the expansion of wireless devices to the edge networks in recent years.Due to limited authentication mechanisms,MAC spoofing attack,also known as the identi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Neural network based approach for time to crash prediction to cope with software aging
收藏 引用
Journal of Systems Engineering and Electronics 2015年 第2期26卷 407-414页
作者: Moona Yakhchi Javier Alonso Mahdi Fazeli Amir Akhavan Bitaraf Ahmad Patooghy School of Computer Science Institute for Research in Fundamental Sciences (IPM) Institute of Advanced Studies on cybersecurity University of Leon department of Computer Engineering Iran University of Technology
Recent studies have shown that software is one of the main reasons for computer systems unavailability. A growing ac- cumulation of software errors with time causes a phenomenon called software aging. This phenomenon ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cloud Datacenter Selection Using Service Broker Policies:A Survey
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 1-41页
作者: Salam Al-E’mari Yousef Sanjalawe Ahmad Al-Daraiseh Mohammad Bany Taha Mohammad Aladaileh department of Information Security Faculty of ITUniversity of PetraAmman11196Jordan Department of Cybersecurity School of ITAmerican University of Madaba(AUM)Amman11821Jordan department of Computer Science School of ITAmerican University of Madaba(AUM)Amman11821Jordan department of Data Science and Artificial Intelligence School of ITAmerican University of Madaba(AUM)Amman11821Jordan
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyberattack Ramifications, The Hidden Cost of a Security Breach
收藏 引用
Journal of Information Security 2024年 第2期15卷 87-105页
作者: Meysam Tahmasebi Department of Cybersecurity EC-Council University Albuquerque USA
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论