咨询与建议

限定检索结果

文献类型

  • 54 篇 会议

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 45 篇 计算机科学与技术...
    • 9 篇 信息与通信工程
    • 6 篇 软件工程
    • 2 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 31 篇 理学
    • 30 篇 数学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 8 篇 privacy
  • 6 篇 security
  • 4 篇 differential pri...
  • 4 篇 machine learning
  • 3 篇 data privacy
  • 3 篇 federated learni...
  • 2 篇 deep learning
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 cloud
  • 2 篇 urban sensing
  • 2 篇 web security
  • 2 篇 local differenti...
  • 2 篇 blockchain
  • 2 篇 data monitoring ...
  • 2 篇 testing
  • 2 篇 oauth
  • 2 篇 fpga
  • 1 篇 bug localization
  • 1 篇 distributed opti...

机构

  • 2 篇 cnr iit lucca
  • 2 篇 north carolina s...
  • 2 篇 univ molise camp...
  • 2 篇 imt sch adv stud...
  • 2 篇 cnr iit campobas...
  • 2 篇 cnr iit pisa
  • 2 篇 virginia tech de...
  • 1 篇 department of co...
  • 1 篇 univ porto cisuc...
  • 1 篇 univ bretagne su...
  • 1 篇 univ coimbra cis...
  • 1 篇 colroado sch min...
  • 1 篇 singapore inst t...
  • 1 篇 univ n carolina ...
  • 1 篇 georgia inst tec...
  • 1 篇 inesc tec porto
  • 1 篇 ericsson secur r...
  • 1 篇 ecole polytech f...
  • 1 篇 univ bretagne oc...
  • 1 篇 acm ny usa

作者

  • 2 篇 enck william
  • 2 篇 santone antonell...
  • 2 篇 mercaldo frances...
  • 2 篇 martinelli fabio
  • 1 篇 kalantari faezeh
  • 1 篇 hsiao shou-ching
  • 1 篇 sun zhibo
  • 1 篇 duarte guilherme
  • 1 篇 wang ruoyu
  • 1 篇 james kedrian
  • 1 篇 dolgavin aleksan...
  • 1 篇 gu xiaohui
  • 1 篇 faye sébastien
  • 1 篇 patel yogi
  • 1 篇 yang hao
  • 1 篇 sudeep tanwar
  • 1 篇 kumar vijay
  • 1 篇 shao xiaofen
  • 1 篇 zaeifi mehrnoosh
  • 1 篇 sachi chaudhary

语言

  • 49 篇 英文
  • 5 篇 其他
检索条件"任意字段=14th ACM Conference on Data and Application Security and Privacy, CODASPY 2024"
54 条 记 录,以下是11-20 订阅
排序:
An Overview of threats Exploring the Confusion Between Top-Level Domains and File Type Extensions  24
An Overview of Threats Exploring the Confusion Between Top-L...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Sales, Anderson Torres, Nuno Pinto, Pedro Inst Politecn Viana do Castelo Viana Do Castelo Portugal INESC TEC Porto Portugal
Cyberattacks exploit deceptions involving the Domain Name Service (DNS) to direct users to fake websites, such as typosquatting attacks, which exploit natural typographical errors, and homograph attacks, where differe... 详细信息
来源: 评论
CoCoT: Collaborative Contact Tracing  24
CoCoT: Collaborative Contact Tracing
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Kann, Trevor Bauer, Lujo Cunningham, Robert K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Univ Pittsburgh Pittsburgh PA USA
Contact tracing can limit the spread of infectious diseases by notifying people of potential exposure to disease. Manual contact tracing is resource-intensive, but much of it can be automated using mobile phones, whic... 详细信息
来源: 评论
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores  24
Examining Cryptography and Randomness Failures in Open-Sourc...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: English, K. Virgil Bennett, Nathaniel thorn, Seaver Butler, Kevin R. B. Enck, William Traynor, Patrick North Carolina State Univ Raleigh NC 27695 USA Univ Florida Gainesville FL USA
Industry is increasingly adopting private 5G networks to securely manage their wireless devices in retail, manufacturing, natural resources, and healthcare. As with most technology sectors, open-source software is wel... 详细信息
来源: 评论
Coherent Multi-Table data Synthesis for Tabular and Time-Series data with GANs  24
Coherent Multi-Table Data Synthesis for Tabular and Time-Ser...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Elliker, Clement Tonnelier, Emeric Shabou, Aymen Grp Credit Agricole DataLab Grp Paris France
As the usage of user-private-data is increasingly monitored by regulatory institutions for security purposes, its transfer becomes more constrained. Synthetic data has recently emerged as a viable alternative to preve... 详细信息
来源: 评论
security Policy Generation and Verification through Large Language Models: A proposal  24
Security Policy Generation and Verification through Large La...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Martinelli, Fabio Mercaldo, Francesco Petrillo, Luca Santone, Antonella CNR IIT Pisa Italy Univ Molise Campobasso Italy CNR IIT Campobasso Italy IMT Sch Adv Studies Lucca Lucca Italy CNR IIT Lucca Italy
the ability to manage and enforce security policies in a rapidly changing digital environment is vital. When enforcing and verifying policies on complex systems, it can be challenging for them to be understood by huma... 详细信息
来源: 评论
CCSM: Building Cross-Cluster security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters  24
CCSM: Building Cross-Cluster Security Models for Edge-Core E...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: GholipourChoubeh, Mahmood Kermabon-Bobinnec, Hugo Majumdar, Suryadipta Jarraya, Yosr Wang, Lingyu Nour, Boubakr Pourzandi, Makan Concordia Univ Montreal PQ Canada Ericsson Secur Res Montreal PQ Canada
With the emergence of 5G networks and their large scale applications such as IoT and autonomous vehicles, telecom operators are increasingly offloading the computation closer to customers (i.e., on the edge). Such edg... 详细信息
来源: 评论
Towards Accurate and Stronger Local Differential privacy for Federated Learning with Staircase Randomized Response  24
Towards Accurate and Stronger Local Differential Privacy for...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Varun, Matta Feng, Shuya Wang, Han Sural, Shamik Hong, Yuan Indian Inst Technol Kharagpur India Univ Connecticut Storrs CT USA Univ Kansas Lawrence KS USA
Federated Learning (FL), a privacy-preserving training approach, has proven to be effective, yet its vulnerability to attacks that extract information from model weights is widely recognized. To address such privacy c... 详细信息
来源: 评论
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks  24
A Unified Time Series Analytics based Intrusion Detection Fr...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Maliha, Maisha Bhattacharjee, Shameek Western Michigan Univ Kalamazoo MI 49008 USA
Modern smart vehicles have a Controller Area Network (CAN) that supports intra-vehicle communication between intelligent Electronic Control Units (ECUs). the CAN is known to be vulnerable to various cyber attacks. In ... 详细信息
来源: 评论
DroidDefender: An Image-based Android Antimalware Proof-of-Concept  24
DroidDefender: An Image-based Android Antimalware Proof-of-C...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Ciaramella, Giovanni Martinelli, Fabio Mercaldo, Francesco Santone, Antonella IMT Sch Adv Studies Lucca Lucca Italy CNR IIT Lucca Italy CNR IIT Pisa Italy Univ Molise Campobasso Italy CNR IIT Campobasso Italy
Malware analysis researchers are currently focused on the design and development of innovative approaches to detect zero-day malware, with particular regard to mobile environments. It is widely recognized that existin... 详细信息
来源: 评论
Crypto'Graph: Leveraging privacy-Preserving Distributed Link Prediction for Robust Graph Learning  24
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link...
收藏 引用
14th acm conference on data and application security and privacy (acm codaspy)
作者: Azogagh, Sofiane Birba, Zelma Aubin Gambs, Sebastien Killijian, Marc-Olivier Univ Quebec Montreal Montreal PQ Canada
Graphs are a widely used data structure for collecting and analyzing relational data. However, when the graph structure is distributed across several parties, its analysis is challenging. In particular, due to the sen... 详细信息
来源: 评论