咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 49 篇 计算机科学与技术...
    • 24 篇 信息与通信工程
    • 10 篇 软件工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
  • 11 篇 理学
    • 9 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 privacy
  • 5 篇 security
  • 4 篇 internet of thin...
  • 4 篇 blockchain
  • 3 篇 intel sgx
  • 3 篇 iot
  • 3 篇 differential pri...
  • 3 篇 machine learning
  • 2 篇 data confidentia...
  • 2 篇 data privacy
  • 2 篇 user privacy
  • 2 篇 attacks
  • 2 篇 vulnerability
  • 2 篇 trust management
  • 2 篇 federated learni...
  • 1 篇 cloud computing:...
  • 1 篇 cyber attacks
  • 1 篇 ethereum
  • 1 篇 threats
  • 1 篇 smart homes

机构

  • 2 篇 univ coimbra cis...
  • 2 篇 univ neuchatel n...
  • 1 篇 north carolina s...
  • 1 篇 state grid jiang...
  • 1 篇 montclair state ...
  • 1 篇 promotion founda...
  • 1 篇 univ porto cisuc...
  • 1 篇 stevens inst tec...
  • 1 篇 university of ma...
  • 1 篇 colroado sch min...
  • 1 篇 university of te...
  • 1 篇 univ fed campina...
  • 1 篇 inesc tec porto
  • 1 篇 nashua high scho...
  • 1 篇 iit roorkee utta...
  • 1 篇 north carolina s...
  • 1 篇 univ houston hou...
  • 1 篇 nashua high scho...
  • 1 篇 indian inst tech...
  • 1 篇 university of lu...

作者

  • 2 篇 cunha mariana
  • 2 篇 felber pascal
  • 2 篇 vilela joao p.
  • 2 篇 mendes ricardo
  • 2 篇 huang xiuli
  • 2 篇 sural shamik
  • 1 篇 franzen fabian
  • 1 篇 debasish jena
  • 1 篇 le traon yves
  • 1 篇 satvat kiavash
  • 1 篇 wang liming
  • 1 篇 duarte guilherme
  • 1 篇 gupta peeyush
  • 1 篇 huh young
  • 1 篇 brito andrey
  • 1 篇 rani p. jhansi
  • 1 篇 zhang tong
  • 1 篇 murynets ilona
  • 1 篇 tsankov petar
  • 1 篇 kalkan kubra

语言

  • 53 篇 英文
  • 1 篇 德文
检索条件"任意字段=10th ACM Conference on Data and Application Security and Privacy, CODASPY 2020"
54 条 记 录,以下是51-60 订阅
排序:
SafeFS: A Modular Architecture for Secure User-Space File Systems (One FUSE to rule them all)  10
SafeFS: A Modular Architecture for Secure User-Space File Sy...
收藏 引用
10th acm International Systems and Storage conference (Systor)
作者: Pontes, Rogerio Burihabwa, Dorian Maia, Francisco Paulo, Joao Schiavoni, Valerio Felber, Pascal Mercier, Hugues Oliveira, Rui Univ Neuchatel Neuchatel Switzerland INESC TEC Porto Portugal Univ Minho Braga Portugal
the exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. this migration occurri... 详细信息
来源: 评论
On the Feasibility of Cryptography for a Wireless Insulin Pump System  16
On the Feasibility of Cryptography for a Wireless Insulin Pu...
收藏 引用
6th acm conference on data and application security and privacy (codaspy)
作者: Marin, Eduard Singelee, Dave Yang, Bohan Verbauwhede, Ingrid Preneel, Bart Katholieke Univ Leuven ESAT COSIC Kasteelpk Arenberg 10 B-3001 Leuven Heverlee Belgium Katholieke Univ Leuven iMinds Kasteelpk Arenberg 10 B-3001 Leuven Heverlee Belgium
this paper analyses the security and privacy properties of a widely used insulin pump and its peripherals. We eavesdrop the wireless channel using Commercial Off-the-Shelf (COTS) software-based radios to intercept the... 详细信息
来源: 评论
Is it really you? User identification via adaptive behavior fingerprinting  14
Is it really you? User identification via adaptive behavior ...
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Giura, Paul Murynets, Ilona Jover, Roger Piqueras Vahlis, Yevgeniy AT and T Security Research Center New York NY United States Bionym Inc. Toronto ON Canada
the increased popularity of mobile devices widens opportunities for a user either to lose the device or to have the device stolen and compromised. At the same time, user interaction with a mobile device generates a un... 详细信息
来源: 评论
Large-scale machine learning-based malware detection: Confronting the "10-Fold cross validation" scheme with reality  14
Large-scale machine learning-based malware detection: Confro...
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Allix, Kevin Bissyandé, Tegawendé F. Jérome, Quentin Klein, Jacques State, Radu Le Traon, Yves University of Luxembourg 4 rue Alphonse Weicker L-2721 Luxembourg Luxembourg
To address the issue of malware detection, researchers have recently started to investigate the capabilities of machine- learning techniques for proposing effective approaches. Several promising results were recorded ... 详细信息
来源: 评论