咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 232 篇 工学
    • 199 篇 计算机科学与技术...
    • 105 篇 软件工程
    • 85 篇 网络空间安全
    • 81 篇 控制科学与工程
    • 76 篇 信息与通信工程
    • 44 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 32 篇 材料科学与工程(可...
    • 17 篇 生物医学工程(可授...
    • 14 篇 力学(可授工学、理...
    • 13 篇 机械工程
    • 11 篇 仪器科学与技术
    • 4 篇 环境科学与工程(可...
    • 3 篇 交通运输工程
  • 85 篇 管理学
    • 53 篇 图书情报与档案管...
    • 36 篇 管理科学与工程(可...
  • 81 篇 理学
    • 58 篇 数学
    • 16 篇 生物学
    • 12 篇 物理学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 17 篇 法学
    • 11 篇 法学
    • 4 篇 政治学
    • 4 篇 社会学
  • 11 篇 医学
    • 10 篇 临床医学
  • 8 篇 教育学
    • 5 篇 教育学
    • 5 篇 心理学(可授教育学...
  • 8 篇 文学
    • 6 篇 外国语言文学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 5 篇 农学
  • 3 篇 艺术学

主题

  • 33 篇 cybersecurity
  • 17 篇 machine learning
  • 16 篇 blockchain
  • 14 篇 deep learning
  • 9 篇 security
  • 7 篇 intrusion detect...
  • 6 篇 artificial intel...
  • 4 篇 iot
  • 4 篇 vulnerability
  • 4 篇 cryptography
  • 4 篇 detection
  • 4 篇 anomaly detectio...
  • 4 篇 intrusion detect...
  • 4 篇 information secu...
  • 4 篇 federated learni...
  • 3 篇 reinforcement le...
  • 3 篇 industry 4.0
  • 3 篇 threat intellige...
  • 3 篇 privacy
  • 3 篇 cyber security

机构

  • 28 篇 school of cyber ...
  • 16 篇 school of cyber ...
  • 15 篇 institute of inf...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 school of cybers...
  • 7 篇 institute of inf...
  • 6 篇 state key labora...
  • 5 篇 cloudemy technol...
  • 5 篇 beijing key labo...
  • 5 篇 school of cybers...
  • 4 篇 sklois institute...
  • 4 篇 school of comput...
  • 3 篇 ieee
  • 3 篇 school of cybers...
  • 3 篇 advanced cryptog...
  • 3 篇 robert h. smith ...
  • 3 篇 school of inform...
  • 3 篇 school of cybers...
  • 3 篇 school of cybers...

作者

  • 15 篇 vijay k. madiset...
  • 13 篇 shibin zhang
  • 7 篇 yan chang
  • 7 篇 jinyue xia
  • 6 篇 yongbin zhou
  • 6 篇 kai chen
  • 5 篇 martin p. loeb
  • 5 篇 arshdeep bahga
  • 5 篇 lei zhou
  • 5 篇 baoxu liu
  • 5 篇 wei huo
  • 5 篇 jiajia liu
  • 5 篇 lawrence a. gord...
  • 4 篇 jinquan zhang
  • 4 篇 lili yan
  • 4 篇 ning li
  • 4 篇 rui zhang
  • 4 篇 wunan wan
  • 4 篇 guozhu meng
  • 4 篇 yuling liu

语言

  • 256 篇 英文
  • 2 篇 中文
检索条件"机构=School of Cybersecurity"
258 条 记 录,以下是1-10 订阅
排序:
Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 587-603页
作者: Wei Wu Liang Yu Liping Yang Yadong Zhang Peng Wang school of cybersecurity Northwestern Polytechnical UniversityXi’an710126China
As an open network architecture,Wireless Computing PowerNetworks(WCPN)pose newchallenges for achieving efficient and secure resource management in networks,because of issues such as insecure communication channels and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault Analysis on AES:A Property-Based Verification Perspective
收藏 引用
Tsinghua Science and Technology 2024年 第2期29卷 576-588页
作者: Xiaojie Dai Xingxin Wang Xue Qu Baolei Mao Wei Hu school of cybersecurity Northwestern Polytechnical UniversityXi’an 710072China school of Cyber Science and Engineering Zhengzhou UniversityZhengzhou 450001China
Fault analysis is a frequently used side-channel attack for ***,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault *** this work,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ensemble successor representations for task generalization in offline-to-online reinforcement learning
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 240-255页
作者: Changhong WANG Xudong YU Chenjia BAI Qiaosheng ZHANG Zhen WANG Space Control and Inertial Technology Research Center Harbin Institute of Technology Shanghai Artificial Intelligence Laboratory Shenzhen Research Institute of Northwestern Polytechnical University school of cybersecurity Northwestern Polytechnical University
In reinforcement learning(RL), training a policy from scratch with online experiences can be inefficient because of the difficulties in exploration. Recently, offline RL provides a promising solution by giving an init... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Framework for cybersecurity Alert Distribution and Response Network (ADRIAN)
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 396-420页
作者: Akarshita Shankar Vijay Madisetti school of cybersecurity and Privacy Georgia Institute of Technology Atlanta USA
Security Information and Event Management (SIEM) platforms are critical for organizations to monitor and manage their security operations centers. However, organizations using SIEM platforms have several challenges su... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Sher: A Secure Broker for DevSecOps and CI/CD Workflows
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 321-339页
作者: Pranau Kumar Vijay K. Madisetti school of cybersecurity and Privacy Georgia Institute of Technology Atlanta USA
GitHub Actions, a popular CI/CD platform, introduces significant security challenges due to its integration with GitHub’s open ecosystem and its use of flexible workflow configurations. This paper presents Sher, a Py... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cloud Datacenter Selection Using Service Broker Policies:A Survey
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 1-41页
作者: Salam Al-E’mari Yousef Sanjalawe Ahmad Al-Daraiseh Mohammad Bany Taha Mohammad Aladaileh Department of Information Security Faculty of ITUniversity of PetraAmman11196Jordan Department of cybersecurity School of ITAmerican University of Madaba(AUM)Amman11821Jordan Department of Computer Science School of ITAmerican University of Madaba(AUM)Amman11821Jordan Department of Data Science and Artificial Intelligence School of ITAmerican University of Madaba(AUM)Amman11821Jordan
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 448-461页
作者: Meenakshi S. P. Manikandaswamy Vijay Madisetti school of cybersecurity and Privacy Georgia Institute of Technology Atlanta USA
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 378-395页
作者: Siddharth M. Madikeri Vijay K. Madisetti school of cybersecurity and Privacy Georgia Institute of Technology Atlanta USA
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Comparative Analysis of cybersecurity Threat Taxonomies for Healthcare Organizations
收藏 引用
Journal of Software Engineering and Applications 2024年 第5期17卷 359-377页
作者: Mahima Jaikanth Vijay K. Madisetti school of cybersecurity and Privacy Georgia Institute of Technology Atlanta GA USA
Information technology is critical in coordinating patient records, smart devices, operations, and critical infrastructure in healthcare organizations, and their constantly changing digital environment, including supp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Design of an SMTP Email Server
收藏 引用
Journal of Electronic Research and Application 2024年 第4期8卷 41-47页
作者: Liheng Hu school of cybersecurity Beijing University of Posts and TelecommunicationsBeijing 100876China
This study developed a mail server program using Socket API and *** program uses the Hypertext Transfer Protocol(HTTP)to receive emails from browser clients and forward them to actual email service providers via the S... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论