咨询与建议

限定检索结果

文献类型

  • 166 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 104 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 22 篇 电气工程
    • 21 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 8 篇 安全科学与工程
    • 8 篇 网络空间安全
    • 7 篇 交通运输工程
    • 5 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 电子科学与技术(可...
    • 1 篇 光学工程
  • 19 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 16 篇 理学
    • 11 篇 数学
    • 6 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 4 篇 化学
    • 2 篇 系统科学
    • 1 篇 生物学
  • 5 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 35 篇 big data
  • 27 篇 security
  • 20 篇 cloud computing
  • 14 篇 privacy
  • 13 篇 cloud security
  • 11 篇 machine learning
  • 10 篇 encryption
  • 8 篇 data privacy
  • 8 篇 network security
  • 6 篇 cloud
  • 6 篇 training
  • 5 篇 deep learning
  • 5 篇 anomaly detectio...
  • 5 篇 predictive model...
  • 5 篇 costs
  • 5 篇 edge computing
  • 5 篇 data models
  • 4 篇 data security
  • 4 篇 resource managem...
  • 4 篇 data analytics

机构

  • 5 篇 peking universit...
  • 4 篇 state grid wenzh...
  • 4 篇 hangzhou sinuoka...
  • 3 篇 nanjing universi...
  • 3 篇 big data center ...
  • 3 篇 state grid zhous...
  • 3 篇 state grid jiang...
  • 3 篇 purdue univ dept...
  • 2 篇 univ maryland ba...
  • 2 篇 state grid shang...
  • 2 篇 ibm watson hlth ...
  • 2 篇 national enginee...
  • 2 篇 adhiparasakthi e...
  • 2 篇 texas tech univ ...
  • 2 篇 data information...
  • 2 篇 air force res la...
  • 2 篇 china south-to-n...
  • 2 篇 huaneng zhalaite...
  • 2 篇 texas tech univ ...
  • 2 篇 huaneng renewabl...

作者

  • 5 篇 wenhui hu
  • 5 篇 shuyi li
  • 4 篇 xueyang liu
  • 4 篇 hu wenhui
  • 4 篇 bhargava bharat
  • 4 篇 chen yang
  • 3 篇 xu xiaolong
  • 3 篇 coffman joel
  • 3 篇 liu xueyang
  • 3 篇 he jinling
  • 3 篇 li shuyi
  • 2 篇 xu ranyue
  • 2 篇 jun xu
  • 2 篇 zhao jinbo
  • 2 篇 azarmi mehdi
  • 2 篇 wei yu
  • 2 篇 beihu wu
  • 2 篇 tangyan
  • 2 篇 singhal mukesh
  • 2 篇 yang yang

语言

  • 161 篇 英文
  • 6 篇 其他
检索条件"任意字段=10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024"
167 条 记 录,以下是41-50 订阅
排序:
cloud Standards in Comparison Are New security Frameworks Improving cloud security?  10
Cloud Standards in Comparison Are New Security Frameworks Im...
收藏 引用
10th ieee International conference on cloud Computing (cloud)
作者: Di Giulio, Carlo Kamhoua, Charles Campbell, Roy H. Sprabery, Read Kwiat, Kevin Bashir, Masooda N. Univ Illinois Urbana IL 61801 USA Air Force Res Lab Wright Patterson AFB OH USA
the increasing relevance of information assurance in cloud computing has forced governments and stakeholders to turn their attention to Information Technology (IT) security certifications and standards. the introducti... 详细信息
来源: 评论
cloud security via Virtualized Out-of-band Execution and Obfuscation  10
Cloud Security via Virtualized Out-of-band Execution and Obf...
收藏 引用
10th ieee International conference on cloud Computing (cloud)
作者: Mumme, Dean C. Wallace, Brooke McGraw, Robert RAM Labs Inc San Diego CA 92108 USA
We describe a multi-layer security system called "Application Protected Execution" (APEx) that has an "In-VM monitoring" functionality protected by out-of-band memory created within a Virtual Machi... 详细信息
来源: 评论
A Survey on Acquiring Integrity of Shared data with Effective user Termination in the cloud  10
A Survey on Acquiring Integrity of Shared Data with Effectiv...
收藏 引用
10th International conference on Intelligent Systems and Control (ISCO)
作者: Shyamambika, N. thillaiarasu, N. SNS Coll Engn Dept Comp Sci & Engn Coimbatore Tamil Nadu India
cloud computing is a term that refers Internet based development and services. these services are remotely hosted, ubiquitous and commoditized. the problem within the cloud computing includes security, policy access a... 详细信息
来源: 评论
An Overview of cloud Middleware Services for Interconnection of Healthcare Platforms
An Overview of Cloud Middleware Services for Interconnection...
收藏 引用
10th International conference on Communications (COMM)
作者: Ochian, Adelina Suciu, George Fratu, Octavian Voicu, Carmen Suciu, Victor Beia Consult Int Res Dept Bucharest Romania Univ Politehn Bucuresti Telecommunicat Dept Bucharest Romania
Using heterogeneous clouds has been considered to improve performance of big-data analytics for healthcare platforms. However, the problem of the delay when transferring big-data over the network needs to be addressed... 详细信息
来源: 评论
security with Privacy - A Research Agenda  10
Security with Privacy - A Research Agenda
收藏 引用
10th ieee International conference on Collaborative Computing Networking Applications and Worksharing
作者: Bertino, Elisa Samanthula, Bharath K. Purdue Univ Cyber Ctr 305 N Univ St W Lafayette IN 47907 USA Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
data is one of the most valuable assets for organization. It can facilitate users or organizations to meet their diverse goals, ranging from scientific advances to business intelligence. Due to the tremendous growth o... 详细信息
来源: 评论
RT-SANE : Real Time security Aware Scheduling on the Network Edge  17
<i>RT</i>-<i>SANE</i> : Real Time Security Aware Scheduling ...
收藏 引用
10th International conference on Utility and cloud Computing (UCC) / 4th International conference on big data Computing, Applications and Technologies (BDCAT)
作者: Singh, Anil Auluck, Nitin Rana, Omer Jones, Andrew Nepal, Surya Indian Inst Technol Dept Comp Sci & Engn Ropar India Cardiff Univ Sch Comp Sci & Informat Cardiff Wales CSIRO Distributed Syst Secur Grp Sydney NSW Australia
Edge computing extends a traditional cloud data centre model often by using a microdata centre (mdc) at the network edge for computation and storage. As these edge devices are in proximity to users, this results in im... 详细信息
来源: 评论
Privacy-Preserving Multi-Party Clustering: An Empirical Study  10
Privacy-Preserving Multi-Party Clustering: An Empirical Stud...
收藏 引用
10th ieee International conference on cloud Computing (cloud)
作者: Silva, Arlei Bellala, Gowtham Univ Calif Santa Barbara Santa Barbara CA 93106 USA C3 IoT Redwood City CA USA
Enterprises are transitioning towards data-driven business processes. there are numerous situations where multiple parties would like to share data towards a common goal, if it were possible to simultaneously protect ... 详细信息
来源: 评论
Compliance-Aware Provisioning of Containers on cloud  10
Compliance-Aware Provisioning of Containers on Cloud
收藏 引用
10th ieee International conference on cloud Computing (cloud)
作者: Bahrami, Mehdi Malvankar, Abhishek Budhraja, Karan K. Kundu, Chinmay Singhal, Mukesh Kundu, Ashish Fujitsu Labs Amer Sunnyvale CA 94085 USA IBM Watson Hlth Yorktown Hts NY USA Univ Maryland Baltimore Cty Baltimore MD 21228 USA Univ Calif Merced Cloud Lab Merced CA USA IBM Thomas J Watson Res Ctr Yorktown Hts NY USA
Deploying applications in containers has several advantages, such as rapid development, portability across different machines, and simplified maintenance. In a cloud computing environment, container scheduling algorit... 详细信息
来源: 评论
Autonomic and Integrated Management for Proactive Cyber security (AIM-PSC)  10
Autonomic and Integrated Management for Proactive Cyber Secu...
收藏 引用
10th International conference on Utility and cloud Computing (UCC) / 4th International conference on big data Computing, Applications and Technologies (BDCAT)
作者: Montero, Fabian De La Pena Hariri, Salim AVIRTEK INC 1236 E Grant Rd Tucson AZ 85719 USA Univ Arizona 1230 E Speedway Blvd Tucson AZ 85719 USA
the complexity, multiplicity, and impact of cyber-attacks have been increasing at an alarming rate despite the significant research and development investment in cyber security products and tools. the current techniqu... 详细信息
来源: 评论
Integrating Continuous security Assessments in Microservices and cloud Native Applications  17
Integrating Continuous Security Assessments in Microservices...
收藏 引用
10th International conference on Utility and cloud Computing (UCC) / 4th International conference on big data Computing, Applications and Technologies (BDCAT)
作者: Torkura, Kennedy A. Sukmana, Muhammad I. H. Meinel, Christoph Univ Potsdam Hasso Plattner Inst Potsdam Germany
cloud Native Applications (CNA) consists of multiple collaborating microservice instances working together towards common goals. these microservices leverage the underlying cloud infrastructure to enable several prope... 详细信息
来源: 评论