咨询与建议

限定检索结果

文献类型

  • 269 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 272 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 218 篇 计算机科学与技术...
    • 67 篇 控制科学与工程
    • 54 篇 电子科学与技术(可...
    • 52 篇 材料科学与工程(可...
    • 50 篇 网络空间安全
    • 49 篇 信息与通信工程
    • 39 篇 软件工程
    • 30 篇 电气工程
    • 25 篇 生物医学工程(可授...
    • 19 篇 力学(可授工学、理...
    • 13 篇 机械工程
    • 7 篇 安全科学与工程
    • 6 篇 仪器科学与技术
    • 4 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
  • 88 篇 理学
    • 51 篇 数学
    • 31 篇 生物学
    • 11 篇 系统科学
    • 8 篇 物理学
    • 5 篇 统计学(可授理学、...
  • 31 篇 管理学
    • 27 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
  • 19 篇 医学
    • 18 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 16 篇 法学
    • 9 篇 法学
    • 6 篇 社会学
  • 12 篇 文学
    • 10 篇 外国语言文学
  • 10 篇 教育学
    • 6 篇 心理学(可授教育学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
    • 4 篇 作物学

主题

  • 83 篇 cybersecurity
  • 47 篇 deep learning
  • 44 篇 machine learning
  • 20 篇 security
  • 15 篇 intrusion detect...
  • 12 篇 blockchain
  • 12 篇 artificial intel...
  • 12 篇 feature selectio...
  • 11 篇 iot
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 cloud computing
  • 9 篇 internet of thin...
  • 8 篇 anomaly detectio...
  • 8 篇 classification
  • 7 篇 vulnerability
  • 7 篇 cyber security
  • 7 篇 malware detectio...
  • 6 篇 metaheuristics
  • 6 篇 information secu...

机构

  • 12 篇 department of in...
  • 11 篇 department of co...
  • 7 篇 department of cy...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of in...
  • 5 篇 information tech...
  • 5 篇 department of el...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 saudi aramco cyb...
  • 4 篇 department of cy...
  • 4 篇 mathematics depa...
  • 4 篇 department of in...
  • 3 篇 research centre ...
  • 3 篇 security enginee...
  • 3 篇 information syst...
  • 3 篇 department of in...
  • 3 篇 department of in...

作者

  • 11 篇 abdelwahed motwa...
  • 11 篇 mesfer al duhayy...
  • 8 篇 manar ahmed hamz...
  • 6 篇 mohamed k.nour
  • 6 篇 radwa marzouk
  • 6 篇 anwer mustafa hi...
  • 6 篇 mahmoud ragab
  • 6 篇 mohammed maray
  • 6 篇 abdullah mohamed
  • 5 篇 fatma s.alrayes
  • 5 篇 saud s.alotaibi
  • 5 篇 heba g.mohamed
  • 5 篇 hamed alqahtani
  • 4 篇 abu sarwar zaman...
  • 4 篇 haya mesfer alsh...
  • 4 篇 sana alazwari
  • 4 篇 walid el-shafai
  • 4 篇 faisal s.alsubae...
  • 4 篇 jaber s.alzahran...
  • 4 篇 chris p. tsokos

语言

  • 268 篇 英文
  • 4 篇 中文
检索条件"机构=the Department of Cybersecurity"
272 条 记 录,以下是1-10 订阅
排序:
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2449-2463页
作者: Maher Alharby cybersecurity department College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyberattack Ramifications, The Hidden Cost of a Security Breach
收藏 引用
Journal of Information Security 2024年 第2期15卷 87-105页
作者: Meysam Tahmasebi department of cybersecurity EC-Council University Albuquerque USA
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
Energy-Efficient Implementation of BCD to Excess-3 Code Converter for Nano-Communication Using QCA Technology
收藏 引用
China Communications 2024年 第6期21卷 103-111页
作者: Nuriddin Safoev Angshuman Khan Khudoykulov Zarif Turakulovich Rajeev Arya department of cybersecurity&Criminology Tashkent University of Information TechnologiesTashkent 100084Uzbekistan department of Electronics and Communication Engineering University of Engineering and ManagementJaipurRajasthan 303807India department of Cryptology Tashkent University of Information TechnologiesTashkent 100084Uzbekistan department of Electronics and Communication Engineering National Institute of Technology PatnaBihar 800005India
Code converters are essential in digital nano communication;therefore,a low-complexity optimal QCA layout for a BCD to Excess-3 code converter has been proposed in this paper.A QCA clockphase-based design technique wa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cloud Datacenter Selection Using Service Broker Policies:A Survey
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 1-41页
作者: Salam Al-E’mari Yousef Sanjalawe Ahmad Al-Daraiseh Mohammad Bany Taha Mohammad Aladaileh department of Information Security Faculty of ITUniversity of PetraAmman11196Jordan department of cybersecurity School of ITAmerican University of Madaba(AUM)Amman11821Jordan department of Computer Science School of ITAmerican University of Madaba(AUM)Amman11821Jordan department of Data Science and Artificial Intelligence School of ITAmerican University of Madaba(AUM)Amman11821Jordan
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Optimization of the Physical Aperture of the Parabolic Reflector Antenna
收藏 引用
Open Journal of Applied Sciences 2024年 第1期14卷 182-192页
作者: Nkordeh Nsikan Akindele Ayoola Ololade Oladoyin Amadi Eberi Ibinabo Bobmanuel department of Business Analytic and Information Management University of Delaware Newark USA department of cybersecurity University of Dallas Dallas USA
In fields like astronomy and radar technology, high-gain antennas are required for long-distance communication. Due to its relatively large gain, the use of parabolic antennas has become very popular over time, becaus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Role of AI in Cyber Security: Safeguarding Digital Identity
收藏 引用
Journal of Information Security 2024年 第2期15卷 245-278页
作者: Mohammad Binhammad Shaikha Alqaydi Azzam Othman Laila Hatim Abuljadayel department of Computer Science British University Dubai Dubai The United Arab Emirates department of cybersecurity Dar Al Hekma University Jeddah Saudi Arabia
This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
收藏 引用
cybersecurity 2024年 第1期7卷 1-15页
作者: Armita Kazeminajafabadi Mahdi Imani department of Electrical and Computer Engineering Northeastern UniversityBostonMAUSA
Early attack detection is essential to ensure the security of complex networks,especially those in critical infrastructures.This is particularly crucial in networks with multi-stage attacks,where multiple nodes are co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An efficient permutation approach for SbPN-based symmetric block ciphers
收藏 引用
cybersecurity 2024年 第2期7卷 113-130页
作者: Mir Nazish M.Tariq Banday Insha Syed Sheena Banday department of Electronics and Instrumentation Technology University ofKashmirSrinagar 190006India
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end cons... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali department of Computer Applications Karpagam College of EngineeringCoimbatore641032India department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet.Regrettably,this d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1419-1439页
作者: Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin department of Computer and Systems Engineering Ain Shams UniversityCairo11517Egypt department of Computer Engineering Technology ElSewedy University of TechnologyCairo44629Egypt
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论