咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 24 篇 信息与通信工程
    • 10 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 privacy
  • 5 篇 security
  • 4 篇 internet of thin...
  • 4 篇 blockchain
  • 3 篇 intel sgx
  • 3 篇 iot
  • 3 篇 differential pri...
  • 3 篇 machine learning
  • 2 篇 data confidentia...
  • 2 篇 data privacy
  • 2 篇 user privacy
  • 2 篇 attacks
  • 2 篇 vulnerability
  • 2 篇 trust management
  • 2 篇 federated learni...
  • 1 篇 cloud computing:...
  • 1 篇 cyber attacks
  • 1 篇 ethereum
  • 1 篇 threats
  • 1 篇 smart homes

机构

  • 2 篇 univ coimbra cis...
  • 2 篇 univ neuchatel n...
  • 1 篇 north carolina s...
  • 1 篇 state grid jiang...
  • 1 篇 montclair state ...
  • 1 篇 promotion founda...
  • 1 篇 univ porto cisuc...
  • 1 篇 stevens inst tec...
  • 1 篇 university of ma...
  • 1 篇 colroado sch min...
  • 1 篇 university of te...
  • 1 篇 univ fed campina...
  • 1 篇 inesc tec porto
  • 1 篇 nashua high scho...
  • 1 篇 iit roorkee utta...
  • 1 篇 north carolina s...
  • 1 篇 univ houston hou...
  • 1 篇 nashua high scho...
  • 1 篇 indian inst tech...
  • 1 篇 university of lu...

作者

  • 2 篇 cunha mariana
  • 2 篇 felber pascal
  • 2 篇 vilela joao p.
  • 2 篇 mendes ricardo
  • 2 篇 huang xiuli
  • 2 篇 sural shamik
  • 1 篇 franzen fabian
  • 1 篇 debasish jena
  • 1 篇 le traon yves
  • 1 篇 satvat kiavash
  • 1 篇 wang liming
  • 1 篇 duarte guilherme
  • 1 篇 gupta peeyush
  • 1 篇 huh young
  • 1 篇 brito andrey
  • 1 篇 rani p. jhansi
  • 1 篇 zhang tong
  • 1 篇 murynets ilona
  • 1 篇 tsankov petar
  • 1 篇 kalkan kubra

语言

  • 53 篇 英文
  • 1 篇 德文
检索条件"任意字段=10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020"
54 条 记 录,以下是41-50 订阅
排序:
Understanding the Responsiveness of Mobile App Developers to Software Library Updates  19
Understanding the Responsiveness of Mobile App Developers to...
收藏 引用
9th acm conference on data and application security and privacy (codaspy)
作者: Yasumatsu, Tatsuhiko Watanabe, Takuya Kanei, Fumihiro Shioji, Eitaro Akiyama, Mitsuaki Mori, Tatsuya Waseda Univ Tokyo Japan NTT Secure Platform Labs Tokyo Japan RIKEN AIP Tokyo Japan
this paper reports a longitudinal measurement study aiming to understand how mobile app developers are responsive to updates of software libraries over time. To quantify their responsiveness to library updates, we col... 详细信息
来源: 评论
Project-Based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related data  12th
Project-Based Methodology to Lecture on Web Frameworks Appli...
收藏 引用
International Joint conference: 12th International conference on Computational Intelligence in security for Information Systems, CISIS 2019 and 10th International conference on European Transnational Education, ICEUTE 2019
作者: Fernández-Cerero, Damián Fernández-Montes, Alejandro Departamento de Lenguajes y Sistemas Informticos Universidad de Sevilla Sevilla Spain
the management and processing of the data generated by healthcare systems is getting more and more attention because of the digitalization of a traditionally analogical sector such as healthcare. Various data manageme... 详细信息
来源: 评论
TLS Encrypted application Classification Using Machine Learning with Flow Feature Engineering  2020
TLS Encrypted Application Classification Using Machine Learn...
收藏 引用
2020 the 10th International conference on Communication and Network security
作者: Onur Barut Rebecca Zhu Yan Luo Tong Zhang University of Massachusetts Lowell USA Nashua High School South Unites States University of Massachusetts Lowell United States Intel Corporation United States
Network traffic classification has become increasingly important as the number of devices connected to the Internet is rapidly growing. Proportionally, the amount of encrypted traffic is also increasing, making payloa... 详细信息
来源: 评论
10th International conference on Soft Computing and Pattern Recognition, SoCPaR 2018
10th International Conference on Soft Computing and Pattern ...
收藏 引用
10th International conference on Soft Computing and Pattern Recognition, SoCPaR 2018
the proceedings contain 38 papers. the special focus in this conference is on Soft Computing and Pattern Recognition. the topics include: Sentiment Analysis on Tweets for Trains Using Machine Learning;a Genetic Algori...
来源: 评论
Trustworthy Management in Decentralized IoT application using Blockchain  10
Trustworthy Management in Decentralized IoT Application usin...
收藏 引用
10th International conference on Computing, Communication and Networking Technologies (ICCCNT)
作者: Mohanta, Bhabendu K. Panda, Soumyashree S. Satapathy, Utkalika Jena, Debasish Gountia, Debasis IIIT Bhubaneshwar Dept Comp Sci & Engn Bhubaneswar 751003 Odisha India IIT Roorkee Dept Comp Sci & Engn Roorkee 247667 Uttarakhand India
Internet of things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application imp... 详细信息
来源: 评论
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?  18
CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Brow...
收藏 引用
8th acm conference on data and application security and privacy (codaspy)
作者: Rodriguez, Juan D. Parra Posegga, Joachim Univ Passau Passau Germany
We introduce a new browser abuse scenario where an attacker uses local storage capabilities without the website's visitor knowledge to create a network of browsers for persistent storage and distribution of arbitr... 详细信息
来源: 评论
Trustworthy Management in Decentralized IoT application using Blockchain
Trustworthy Management in Decentralized IoT Application usin...
收藏 引用
International conference on Computing and Networking Technology (ICCNT)
作者: Bhabendu K. Mohanta Soumyashree S. Panda Utkalika Satapathy Debasish Jena Debasis Gountia IIIT Bhubaneshwar Odisha India IIT Roorkee Uttarakhand India
Internet of things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application imp... 详细信息
来源: 评论
Secure and privacy-Aware data Dissemination for Cloud-Based applications  17
Secure and Privacy-Aware Data Dissemination for Cloud-Based ...
收藏 引用
10th International conference on Utility and Cloud Computing (UCC) / 4th International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Sampaio, Lilia Silva, Fabio Souza, Amanda Brito, Andrey Felber, Pascal Univ Fed Campina Grande Campina Grande Paraiba Brazil Univ Neuchatel Neuchatel Switzerland
In this paper we propose a data dissemination platform that supports data security and different privacy levels even when the platform and the data are hosted by untrusted infrastructures. the proposed system aims at ... 详细信息
来源: 评论
RT-SANE : Real Time security Aware Scheduling on the Network Edge  17
<i>RT</i>-<i>SANE</i> : Real Time Security Aware Scheduling ...
收藏 引用
10th International conference on Utility and Cloud Computing (UCC) / 4th International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Singh, Anil Auluck, Nitin Rana, Omer Jones, Andrew Nepal, Surya Indian Inst Technol Dept Comp Sci & Engn Ropar India Cardiff Univ Sch Comp Sci & Informat Cardiff Wales CSIRO Distributed Syst Secur Grp Sydney NSW Australia
Edge computing extends a traditional cloud data centre model often by using a microdata centre (mdc) at the network edge for computation and storage. As these edge devices are in proximity to users, this results in im... 详细信息
来源: 评论
Synthesis of Probabilistic privacy Enforcement  17
Synthesis of Probabilistic Privacy Enforcement
收藏 引用
24th acm-SIGSAC conference on Computer and Communications security (acm CCS)
作者: Kucera, Martin Tsankov, Petar Gehr, Timon Guarnieri, Marco Vechev, Martin Swiss Fed Inst Technol Zurich Switzerland
Existing probabilistic privacy enforcement approaches permit the execution of a program that processes sensitive data only if the information it leaks is within the bounds specified by a given policy. thus, to extract... 详细信息
来源: 评论