咨询与建议

限定检索结果

文献类型

  • 41 册 图书

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 12 篇 计算机科学与技术...
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 软件工程
    • 1 篇 公安技术
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 1 篇 法学
    • 1 篇 公安学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 26 篇 systems and data...
  • 3 篇 computer science
  • 2 篇 computer securit...
  • 2 篇 artificial intel...
  • 2 篇 privacy
  • 1 篇 humanities issue...
  • 1 篇 information
  • 1 篇 wireless communi...
  • 1 篇 software enginee...
  • 1 篇 mobile geographi...
  • 1 篇 location-based s...
  • 1 篇 cybercrime
  • 1 篇 mobile and netwo...
  • 1 篇 information scie...
  • 1 篇 professional com...
  • 1 篇 digital lifestyl...
  • 1 篇 synthesis
  • 1 篇 computer network...
  • 1 篇 cyber-physical s...
  • 1 篇 machine learning

机构

  • 9 篇 purdue universit...
  • 2 篇 columbia univers...
  • 2 篇 victoria univers...
  • 2 篇 university of ne...
  • 2 篇 sba research aus...
  • 2 篇 indian institute...
  • 2 篇 ibm research
  • 2 篇 technische unive...
  • 2 篇 intel collaborat...
  • 2 篇 national institu...
  • 2 篇 missouri univers...
  • 2 篇 carnegie mellon ...
  • 1 篇 university of sc...
  • 1 篇 aalto university...
  • 1 篇 the pennsylvania...
  • 1 篇 indian institute...
  • 1 篇 university of wi...
  • 1 篇 university of du...
  • 1 篇 hamad bin khalif...
  • 1 篇 national institu...

作者

  • 3 篇 lucas davi
  • 3 篇 elisa bertino
  • 3 篇 sourya joyee de
  • 3 篇 ahmad-reza sadeg...
  • 2 篇 katharina krombh...
  • 2 篇 abdessamad imine
  • 2 篇 stephan heuser
  • 2 篇 ninghui li
  • 2 篇 edgar weippl
  • 2 篇 kari kostiainen
  • 2 篇 alexandra dmitri...
  • 2 篇 n. asokan
  • 1 篇 kanade sanjay
  • 1 篇 shu xiaokui
  • 1 篇 dorizzi bernadet...
  • 1 篇 david sánchez
  • 1 篇 ravi
  • 1 篇 cheng long
  • 1 篇 yingjiu li
  • 1 篇 daniel le métaye...

语言

  • 39 篇 英文
  • 2 篇 中文
检索条件"丛书名=Synthesis Lectures on Information Security, Privacy, and Trust"
41 条 记 录,以下是1-10 订阅
排序:
privacy Risk Analysis of Online Social Networks
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2020年
作者: Sourya Joyee De Abdessamad Imine
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even ... 详细信息
来源: 评论
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2017年
作者: Yao, Danfeng (Daphne) Shu, Xiaokui Cheng, Long
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse dete... 详细信息
来源: 评论
Cyber-Physical security and privacy in the Electric Smart Grid
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2017年
作者: McMillin, Bruce Roth, Thomas
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice...
来源: 评论
"Digital Forensic Science: Issues, Methods, and Challenges"
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2016年
作者: "Vassil Roussev Series Editors: Elisa Bertino & Ravi Sandhu"
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical pers... 详细信息
来源: 评论
Database Anonymization: privacy Models, Data Utility, and Microaggregation-based Inter-model Connections  Database anonymization : privacy models, data utility, and microaggregation-based inter-model connections /
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2016年
作者: Domingo-Ferrer, Josep Sanchez, David Soria-Comas, Jordi
The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techn... 详细信息
来源: 评论
trust in Social Media
收藏 引用
丛书名: synthesis lectures on information security, privacy & trust
2015年
作者: Tang, Jiliang Liu, Huan
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated cont... 详细信息
来源: 评论
Usable security: History, Themes, and Challenges
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2014年
作者: Garfinkel, Simson Lipford, Heather Richter
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer security, more colloquially known as ``usable security.'' Although usability and se...
来源: 评论
Reversible Digital Watermarking: Theory and Practices
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2014年
作者: Naskar, Ruchira Chakraborty, Rajat Subhra
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermar... 详细信息
来源: 评论
Mobile Platform security
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2014年
作者: N. Asokan Lucas Davi Alexandra Dmitrienko Stephan Heuser Kari Kostiainen
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application d...
来源: 评论
privacy for Location-based Services
收藏 引用
丛书名: synthesis lectures on information security, privacy, and trust
2013年
作者: Ghinita, Gabriel
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locati... 详细信息
来源: 评论