咨询与建议

限定检索结果

文献类型

  • 25,234 篇 期刊文献
  • 1,579 篇 会议
  • 4 册 图书

馆藏范围

  • 26,817 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,584 篇 工学
    • 10,161 篇 计算机科学与技术...
    • 6,337 篇 材料科学与工程(可...
    • 5,647 篇 电气工程
    • 4,529 篇 电子科学与技术(可...
    • 4,188 篇 信息与通信工程
    • 3,647 篇 机械工程
    • 3,607 篇 控制科学与工程
    • 1,734 篇 仪器科学与技术
    • 1,678 篇 网络空间安全
    • 1,672 篇 力学(可授工学、理...
    • 1,479 篇 生物医学工程(可授...
    • 1,351 篇 软件工程
    • 1,090 篇 环境科学与工程(可...
    • 1,076 篇 化学工程与技术
    • 1,063 篇 动力工程及工程热...
    • 753 篇 建筑学
    • 738 篇 水利工程
    • 639 篇 光学工程
  • 14,077 篇 理学
    • 4,860 篇 物理学
    • 4,589 篇 数学
    • 2,382 篇 生物学
    • 2,257 篇 化学
    • 1,864 篇 天文学
    • 992 篇 系统科学
    • 959 篇 地球物理学
  • 2,860 篇 医学
    • 2,428 篇 临床医学
    • 629 篇 基础医学(可授医学...
  • 1,507 篇 管理学
    • 761 篇 图书情报与档案管...
    • 659 篇 管理科学与工程(可...
  • 1,066 篇 农学
  • 732 篇 经济学
    • 692 篇 应用经济学
  • 595 篇 法学
  • 437 篇 教育学
  • 304 篇 文学
  • 125 篇 艺术学
  • 64 篇 军事学
  • 35 篇 历史学
  • 15 篇 哲学

主题

  • 697 篇 deep learning
  • 434 篇 machine learning
  • 390 篇 security
  • 207 篇 internet of thin...
  • 177 篇 analysis
  • 167 篇 blockchain
  • 158 篇 network
  • 136 篇 clustering
  • 131 篇 system
  • 113 篇 model
  • 112 篇 of
  • 105 篇 simulation
  • 103 篇 image
  • 103 篇 information
  • 100 篇 data
  • 97 篇 optimization
  • 93 篇 cloud computing
  • 88 篇 artificial intel...
  • 88 篇 classification
  • 78 篇 gis

机构

  • 155 篇 ieee
  • 91 篇 university of ch...
  • 54 篇 department of co...
  • 48 篇 college of infor...
  • 39 篇 beijing national...
  • 37 篇 department of in...
  • 36 篇 department of in...
  • 34 篇 beijing academy ...
  • 32 篇 department of co...
  • 30 篇 university of ch...
  • 30 篇 state key labora...
  • 28 篇 school of cyber ...
  • 28 篇 department of el...
  • 26 篇 school of comput...
  • 26 篇 department of el...
  • 24 篇 school of inform...
  • 22 篇 department of au...
  • 22 篇 department of co...
  • 22 篇 department of el...
  • 22 篇 school of inform...

作者

  • 55 篇 abdelwahed motwa...
  • 51 篇 mehedi masud
  • 45 篇 yunyoung nam
  • 40 篇 jian wang
  • 39 篇 jun wang
  • 32 篇 wei liu
  • 31 篇 jing zhang
  • 28 篇 jun zhang
  • 27 篇 abu sarwar zaman...
  • 27 篇 imran khan
  • 25 篇 cheng-wei qiu
  • 24 篇 hui wang
  • 24 篇 chen chen
  • 23 篇 hong chen
  • 22 篇 rui wang
  • 21 篇 罗毅
  • 21 篇 xin liu
  • 21 篇 li zhang
  • 20 篇 mengchu zhou
  • 20 篇 gang liu

语言

  • 24,267 篇 英文
  • 2,550 篇 中文
检索条件"机构=Department of Information Security Engineering"
26817 条 记 录,以下是1-10 订阅
排序:
CNN-Based RF Fingerprinting Method for Securing Passive Keyless Entry and Start System
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1891-1909页
作者: Hyeon Park SeoYeon Kim Seok Min Ko TaeGuen Kim department of Smart Convergence security Soonchunhyang UniversityAsanKorea Department of Information Security Engineering Soonchunhyang UniversityAsanKorea
The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety.One key system that needs protection is the passive key entry system(PKES).To prevent attacks aimed at ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Detecting IoT Botnet in 5G Core Network Using Machine Learning
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 4467-4488页
作者: Ye-Eun Kim Min-Gyu Kim Hwankuk Kim department of Electronics information and System engineering Sangmyung UniversityCheonan-siKorea Department of Information Security Engineering Sangmyung UniversityCheonan-siKorea
As Internet of Things(IoT)devices with security issues are connected to 5G mobile networks,the importance of IoT Botnet detection research in mobile network environments is increasing.However,the existing research foc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3401-3424页
作者: Jun-Seob Kim Ki-Woong Park department of Computer and information security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A ransomware attack that interrupted the operation of Colonial Pipeline(a large U.S.oil pipeline company),showed that security threats by malware have become serious enough to affect industries and social infrastructu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 53-67页
作者: Joo-Chan Lee Hyun-Pyo Choi Jang-Hoon Kim Jun-Won Kim Da-Un Jung Ji-Ho Shin Jung-Taek Seo Department of Information Security Engineering Soonchunhyang UniversityAsan31538Korea
Cyberattacks on the Industrial Control System(ICS)have recently been increasing,made more intelligent by advancing technologies.As such,cybersecurity for such systems is attracting attention.As a core element of contr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
收藏 引用
Science China(information Sciences) 2015年 第12期58卷 89-103页
作者: ZHANG WenTao BAO ZhenZhen LIN DongDai Vincent RIJMEN YANG Bo Han Ingrid VERBAUWHEDE State Key Laboratory of information security Institute of Information EngineeringChinese Academy of Sciences department of Electrical engineering ESAT COSIC and i Minds Security Department
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic
收藏 引用
Computer Systems Science & engineering 2023年 第10期47卷 1125-1147页
作者: Yea-Sul Kim Ye-Eun Kim Hwankuk Kim department of Electronics information and System engineering Sangmyung UniversityCheonan31066Korea Department of Information Security Engineering Sangmyung UniversityCheonan31066Korea
With the commercialization of 5th-generation mobile communications(5G)networks,a large-scale internet of things(IoT)environment is being built.security is becoming increasingly crucial in 5G network environments due t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum Private Comparison of Equality Based on Five-Particle Cluster State
收藏 引用
Communications in Theoretical Physics 2016年 第12期65卷 621-628页
作者: 昌燕 张文博 张仕斌 王海春 闫丽丽 韩桂华 盛志伟 黄源源 索望 熊金鑫 Department of Information Security Engineering Chengdu University of Information Technology School of Economics Sichuan University
A protocol for quantum private comparison of equality(QPCE) is proposed based on five-particle cluster state with the help of a semi-honest third party(TP). In our protocol, TP is allowed to misbehave on its own but c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Review of Public-Key Cryptosystem Based on the Error Correcting Code
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第6期19卷 489-496页
作者: LI Zhongyuan QU Chengqin ZHOU Xueguang ZHUO Lifeng department of information security Naval University of Engineering
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
收藏 引用
Science China(information Sciences) 2020年 第3期63卷 20-33页
作者: Chao LIN Debiao HE Sherali ZEADALLY Neeraj KUMAR Kim-Kwang Raymond CHOO Key Laboratory of Aerospace information security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University State Key Laboratory of Cryptology College of Communication and information University of Kentucky department of Computer Science and engineering Thapar University department of information Systems and Cyber security and department of Electrical and Computer engineering University of Texas at San Antonio
A robust and scalable crowd management infrastructure is crucial in addressing operational challenges when deploying high-density sensors and actuators in a smart city. While crowdsourcing is widely used in crowd mana... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A more compact multi-id identity-based FHE scheme in the standard model and its applications
收藏 引用
Science China(information Sciences) 2019年 第3期62卷 190-192页
作者: Xueqing WANG Biao WANG Bei LIANG Rui XUE State Key Laboratory of information security Institute of Information EngineeringChinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences department of Computer Science and engineering Chalmers University of Technology
Dear editor,Fully homomorphic encryption (FHE) is a cryptographic primitive that allows anyone, even those without a secret key, to perform arbitrary computation on encrypted data. Since Gentry’s breakthrough realiza... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论