咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 24 篇 信息与通信工程
    • 10 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 privacy
  • 5 篇 security
  • 4 篇 internet of thin...
  • 4 篇 blockchain
  • 3 篇 intel sgx
  • 3 篇 iot
  • 3 篇 differential pri...
  • 3 篇 machine learning
  • 2 篇 data confidentia...
  • 2 篇 data privacy
  • 2 篇 user privacy
  • 2 篇 attacks
  • 2 篇 vulnerability
  • 2 篇 trust management
  • 2 篇 federated learni...
  • 1 篇 cloud computing:...
  • 1 篇 cyber attacks
  • 1 篇 ethereum
  • 1 篇 threats
  • 1 篇 smart homes

机构

  • 2 篇 univ coimbra cis...
  • 2 篇 univ neuchatel n...
  • 1 篇 north carolina s...
  • 1 篇 state grid jiang...
  • 1 篇 montclair state ...
  • 1 篇 promotion founda...
  • 1 篇 univ porto cisuc...
  • 1 篇 stevens inst tec...
  • 1 篇 university of ma...
  • 1 篇 colroado sch min...
  • 1 篇 university of te...
  • 1 篇 univ fed campina...
  • 1 篇 inesc tec porto
  • 1 篇 nashua high scho...
  • 1 篇 iit roorkee utta...
  • 1 篇 north carolina s...
  • 1 篇 univ houston hou...
  • 1 篇 nashua high scho...
  • 1 篇 indian inst tech...
  • 1 篇 university of lu...

作者

  • 2 篇 cunha mariana
  • 2 篇 felber pascal
  • 2 篇 vilela joao p.
  • 2 篇 mendes ricardo
  • 2 篇 huang xiuli
  • 2 篇 sural shamik
  • 1 篇 franzen fabian
  • 1 篇 debasish jena
  • 1 篇 le traon yves
  • 1 篇 satvat kiavash
  • 1 篇 wang liming
  • 1 篇 duarte guilherme
  • 1 篇 gupta peeyush
  • 1 篇 huh young
  • 1 篇 brito andrey
  • 1 篇 rani p. jhansi
  • 1 篇 zhang tong
  • 1 篇 murynets ilona
  • 1 篇 tsankov petar
  • 1 篇 kalkan kubra

语言

  • 53 篇 英文
  • 1 篇 德文
检索条件"任意字段=10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020"
54 条 记 录,以下是21-30 订阅
排序:
the Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications  20
The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authe...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Pernpruner, Marco Carbone, Roberto Ranise, Silvio Sciarretta, Giada Fdn Bruno Kessler Secur & Trust Res Unit Trento Italy
Everyday life is permeated by new technologies allowing people to perform almost any kind of operation from their smart devices. Although this is amazing from a convenience perspective, it may result in several securi... 详细信息
来源: 评论
PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model  20
PREDICT: Efficient Private Disease Susceptibility Testing in...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Ugwuoke, Chibuike Erkin, Zekeriya Reinders, Marcel Lagendijk, Reginald L. Delft Univ Technol Delft Netherlands
Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services i... 详细信息
来源: 评论
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network  20
SeCaS: Secure Capability Sharing Framework for IoT Devices i...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Aktypi, Angeliki Kalkan, Kubra Rasmussen, Kasper B. Univ Oxford Dept Comp Sci Oxford England Ozyegin Univ Dept Comp Sci Istanbul Turkiye
the emergence of the internet of things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a pers... 详细信息
来源: 评论
Ensuring privacy and security of IoT Networks Utilizing Blockchain and Federated Learning  10
Ensuring Privacy and Security of IoT Networks Utilizing Bloc...
收藏 引用
10th International conference on Future Internet of things and Cloud, FiCloud 2023
作者: Rashid, Md Mamunur Choi, Piljoo Lee, Suk-Hwan Platos, Jan Huh, Young Kwon, Ki-Ryong Pukyong National University Department of Artificial Intelligence Convergence Busan Korea Republic of Donga University Department of Computer Engineering Busan Korea Republic of VSB-Technical University of Ostrava Department of Electrical Engineering and Computer Science Ostrava Czech Republic Promotion Foundation Korea Smart Medical Device Industry Seoul Korea Republic of
the Internet of things (IoT) has become a game-changing technology, bridging the gap between the real and virtual worlds and allowing for smooth data transfer and communication between linked objects. the other two po... 详细信息
来源: 评论
TrustAV: Practical and privacy-Preserving Malware Analysis in the Cloud  20
TrustAV: Practical and Privacy-Preserving Malware Analysis i...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Deyannis, Dimitris Papadogiannaki, Eva Kalivianakis, Giorgos Vasiliadis, Giorgos Ioannidis, Sotiris FORTH ICS Iraklion Greece Univ Crete Dept Comp Sci Rethimnon Crete Greece
While the number of connected devices is constantly growing, we observe an increased incident rate of cyber attacks that target user data. Typically, personal devices contain the most sensitive information regarding t... 详细信息
来源: 评论
A Hypothesis Testing Approach to Sharing Logs with Confidence  20
A Hypothesis Testing Approach to Sharing Logs with Confidenc...
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Long, Yunhui Xu, Le Gunter, Carl A. Univ Illinois Urbana IL 61801 USA
Logs generated by systems and applications contain a wide variety of heterogeneous information that is important for performance profiling, failure detection, and security analysis. there is a strong need for sharing ... 详细信息
来源: 评论
Can AI be for Good in the Midst of Cyber Attacks and privacy Violations?: A Position Paper  10
Can AI be for Good in the Midst of Cyber Attacks and Privacy...
收藏 引用
10th acm conference on data and application security and privacy, codaspy 2020
作者: thuraisingham, Bhavani M. University of Texas at Dallas Richardson TX United States
Artificial Intelligence (AI) is affecting every aspect of our lives from healthcare to finance to driving to managing the home. Sophisticated machine learning techniques with a focus on deep learning are being applied... 详细信息
来源: 评论
Explore the Transformation Space for Adversarial Images  20
Explore the Transformation Space for Adversarial Images
收藏 引用
10th acm conference on data and application security and privacy (codaspy)
作者: Chen, Jiyu Wang, David Chen, Hao Univ Calif Davis Davis CA 95616 USA Vestavia Hills High Sch Vestavia Hills AL USA
Deep learning models are vulnerable to adversarial examples. Most of current adversarial attacks add pixel-wise perturbations restricted to some L-p -norm, and defense models are evaluated also on adversarial examples... 详细信息
来源: 评论
N-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web applications  10
N-m-Variant Systems: Adversarial-Resistant Software Rejuvena...
收藏 引用
10th acm conference on data and application security and privacy, codaspy 2020
作者: Polinsky, Isaac Martin, Kyle Enck, William Reiter, Michael K. North Carolina State University Raleigh NC United States University of North Carolina at Chapel Hill Chapel Hill NC United States
Web servers are a popular target for adversaries as they are publicly accessible and often vulnerable to compromise. Compromises can go unnoticed for months, if not years, and recovery often involves a complete system... 详细信息
来源: 评论
10th EAI International conference on Big data Technologies and applications, BDTA 2020 and 13th EAI International conference on Wireless Internet, WiCON 2020
10th EAI International Conference on Big Data Technologies a...
收藏 引用
10th EAI International conference on Big data Technologies and applications, BDTA 2020 and 13th EAI International conference on Wireless Internet, WiCON 2020
the proceedings contain 14 papers. the special focus in this conference is on Big data Technologies and applications. the topics include: Performance Evaluation of Energy Detection, Matched Filtering and KNN Under Dif...
来源: 评论