咨询与建议

限定检索结果

文献类型

  • 124 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 105 篇 计算机科学与技术...
    • 73 篇 软件工程
    • 30 篇 信息与通信工程
    • 26 篇 网络空间安全
    • 12 篇 电气工程
    • 10 篇 安全科学与工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 生物工程
    • 1 篇 土木工程
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 17 篇 理学
    • 11 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 17 篇 管理学
    • 12 篇 图书情报与档案管...
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 9 篇 法学
    • 7 篇 社会学
    • 2 篇 法学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学

主题

  • 10 篇 security
  • 7 篇 network security
  • 5 篇 malware
  • 4 篇 cryptography
  • 3 篇 collaborative fi...
  • 3 篇 websites
  • 3 篇 cloud computing
  • 2 篇 smartphones
  • 2 篇 big data
  • 2 篇 random access st...
  • 2 篇 authentication
  • 2 篇 cloud
  • 2 篇 embedded devices
  • 2 篇 android
  • 2 篇 machine learning
  • 2 篇 cloud security
  • 2 篇 trusted computin...
  • 2 篇 trusted
  • 2 篇 mobile security
  • 2 篇 web services

机构

  • 3 篇 university of ca...
  • 2 篇 success lab texa...
  • 2 篇 network security...
  • 2 篇 laboratory of co...
  • 2 篇 tech univ darmst...
  • 2 篇 north carolina s...
  • 2 篇 department of el...
  • 2 篇 george mason uni...
  • 2 篇 beijing key labo...
  • 2 篇 inria sophia ant...
  • 2 篇 imdea software i...
  • 2 篇 institute of com...
  • 1 篇 school of inform...
  • 1 篇 southern methodi...
  • 1 篇 school of inform...
  • 1 篇 oregon systems i...
  • 1 篇 harvard universi...
  • 1 篇 department of el...
  • 1 篇 china natl digit...
  • 1 篇 department of co...

作者

  • 3 篇 lie david
  • 3 篇 barthe gilles
  • 2 篇 zhang yuqing
  • 2 篇 capkun srdjan
  • 2 篇 suri neeraj
  • 2 篇 zou wei
  • 2 篇 guajardo jorge
  • 2 篇 sion radu
  • 2 篇 nelson blaine
  • 2 篇 gregoire benjami...
  • 2 篇 fahl sascha
  • 2 篇 gu guofei
  • 2 篇 savage stefan
  • 2 篇 xu shouhuai
  • 2 篇 williams peter
  • 2 篇 kruegel christop...
  • 2 篇 smith matthew
  • 2 篇 yu ting
  • 2 篇 katzenbeisser st...
  • 2 篇 cárdenas alvaro ...

语言

  • 129 篇 英文
检索条件"任意字段=2012 ACM Conference on Computer and Communications Security, CCS 2012"
129 条 记 录,以下是1-10 订阅
排序:
ccs'12 - Proceedings of the 2012 acm conference on computer and communications security
CCS'12 - Proceedings of the 2012 ACM Conference on Computer ...
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
The proceedings contain 111 papers. The topics discussed include: Fides: selectively hardening software application components against kernel-level or process-level malware;Vigilare: toward snoop-based kernel integrit...
来源: 评论
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)  15
Fifth International Workshop on Trustworthy Embedded Devices...
收藏 引用
22nd acm SIGSAC conference on computer and communications security (ccs)
作者: Guajardo, Jorge Katzenbeisser, Stefan Bosch Res & Technol Ctr Palo Alto CA 94304 USA Tech Univ Darmstadt Darmstadt Germany
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring ... 详细信息
来源: 评论
STC 2012: The seventh acm Workshop on Scalable Trusted Computing  12
STC 2012: The seventh ACM Workshop on Scalable Trusted Compu...
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Zhang, Xinwen Ding, Xuhua Huawei Research Center United States Singapore Management University Singapore
Trusted computing plays a pivotal role to facilitate a party to evaluate the integrity of others or to ensure desired security assurance, which is a very challenging task in large-scale and heterogeneous computing env... 详细信息
来源: 评论
Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)  14
Fourth International Workshop on Trustworthy Embedded Device...
收藏 引用
21st acm conference on computer and communications security (ccs)
作者: Armknecht, Frederik Guajardo, Jorge Univ Mannheim Mannheim Germany Bosch Res & Technol Ctr Pittsburgh PA USA
The Internet of Things (IoTS) is expected to seamlessly connect everything and everyone and bring about the promise of smart environments, industry 4.0, intelligent infrastructure management, environmental monitoring ... 详细信息
来源: 评论
4th cloud computing security workshop (ccsW 2012)  12
4th cloud computing security workshop (CCSW 2012)
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Capkun, Srdjan Kamara, Seny ETH Zurich Switzerland Microsoft Research United States
Notwithstanding the latest buzzword (grid, cloud, utility computing, SaaS, etc.), large-scale computing and cloud-like infrastructures are here to stay. How exactly they will look like tomorrow is still for the market... 详细信息
来源: 评论
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12)  12
Second workshop on building analysis datasets and gathering ...
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Christodorescu, Mihai IBM T.J. Watson Research Center 1101 Kitchawan Rd. Yorktown Heights NY 10598 United States
As more and more systems are controlled by computers and connected to the Internet, a tremendous amount of activity is generated when these systems interact with each other and with their users. The continuous stream ... 详细信息
来源: 评论
Intransitive noninterference in nondeterministic systems  12
Intransitive noninterference in nondeterministic systems
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Engelhardt, Kai Van Der Meyden, Ron Zhang, Chenyi Computer Science and Engineering University of New South Wales Sydney NSW 2052 Australia Information Technology and Electrical Engineering University of Queensland Brisbane QLD 4072 Australia
This paper addresses the question of how TA-security, a semantics for intransitive information-flow policies in deterministic systems, can be generalized to nondeterministic systems. Various definitions are proposed, ... 详细信息
来源: 评论
Hardware enhanced security  12
Hardware enhanced security
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Lee, Ruby Sethumadhavan, Simha Suh, G. Edward Princeton University Princeton NJ United States Columbia University New York NY United States Cornell University Ithaca NY United States
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer s... 详细信息
来源: 评论
ccs'12 co-located workshop summary for SPSM 2012  12
CCS'12 co-located workshop summary for SPSM 2012
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Enck, William Jiang, Xuxian North Carolina State University United States
Mobile devices such as smartphones and Internet-capable tablets have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a sour... 详细信息
来源: 评论
Provable security of S-BGP and other path vector protocols: Model, analysis and extensions  12
Provable security of S-BGP and other path vector protocols: ...
收藏 引用
2012 acm conference on computer and communications security, ccs 2012
作者: Boldyreva, Alexandra Lychev, Robert Georgia Institute of Technology Atlanta United States
This paper provides the provable-security treatment of path vector routing protocols. We first design a security definition for routing path vector protocols by studying, generalizing, and formalizing numerous known t... 详细信息
来源: 评论