咨询与建议

限定检索结果

文献类型

  • 46 篇 会议

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 36 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 4 篇 sensitive data
  • 4 篇 security
  • 2 篇 static analysis
  • 2 篇 network security
  • 2 篇 cloud computing
  • 2 篇 privacy
  • 1 篇 pattern mining
  • 1 篇 intrusion detect...
  • 1 篇 iot devices
  • 1 篇 health
  • 1 篇 role-based acces...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 bindiff
  • 1 篇 human behavior
  • 1 篇 graph database
  • 1 篇 interoperability
  • 1 篇 data privacy
  • 1 篇 smartphones
  • 1 篇 barbican

机构

  • 1 篇 department of co...
  • 1 篇 univ tokyo bunky...
  • 1 篇 stevens inst tec...
  • 1 篇 the pennsylvania...
  • 1 篇 qinghai universi...
  • 1 篇 university of mi...
  • 1 篇 school of electr...
  • 1 篇 kth royal inst t...
  • 1 篇 purdue universit...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 politehnica univ...
  • 1 篇 school of comput...
  • 1 篇 university of lu...
  • 1 篇 fraunhofer aisec...
  • 1 篇 ibm tj watson re...
  • 1 篇 vtt technical re...
  • 1 篇 umass boston uni...
  • 1 篇 bionym inc. on
  • 1 篇 gh raisoni coll ...

作者

  • 2 篇 rizvi syed zain ...
  • 2 篇 islam mohammad s...
  • 2 篇 rughinis razvan
  • 2 篇 ghinita gabriel
  • 2 篇 maiti rajib ranj...
  • 2 篇 kuzu mehmet
  • 2 篇 fong philip w. l...
  • 2 篇 kantarcioglu mur...
  • 1 篇 hsiao shou-ching
  • 1 篇 sistla a. prasad
  • 1 篇 le traon yves
  • 1 篇 litton jan-eric
  • 1 篇 guanyu tian
  • 1 篇 madhavan krishna
  • 1 篇 lovat enrico
  • 1 篇 li yingjiu
  • 1 篇 forg fabian
  • 1 篇 saji nobuyuki
  • 1 篇 michael mitchell
  • 1 篇 chen shanji

语言

  • 46 篇 英文
检索条件"任意字段=4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014"
46 条 记 录,以下是11-20 订阅
排序:
privacy-Preserving HMM Forward Computation  17
Privacy-Preserving HMM Forward Computation
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Ziegeldorf, Jan Henrik Metzke, Jan Rueth, Jan Henze, Martin Wehrle, Klaus Rhein Westfal TH Aachen Commun & Distributed Syst COMSYS Aachen Germany
In many areas such as bioinformatics, pattern recognition, and signal processing, Hidden Markov Models (HMMs) have become an indispensable statistical tool. A fundamental building block for these applications is the F... 详细信息
来源: 评论
the Human Capital Model for security Research New Insights into Technology Transition  17
The Human Capital Model for Security Research New Insights i...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Rajagopalan, S. Raj Honeywell Phoenix AZ 85034 USA
As a security researcher, have you ever wondered how much of security research that is done and presented at research conferences is ever used by practitioners or is incorporated into products? Four years ago we forme... 详细信息
来源: 评论
Random Response privacy data Mining Based on Cloud Computing Resource Association Rules
Random Response Privacy Data Mining Based on Cloud Computing...
收藏 引用
2018 4th International conference on Education,Management and Information Technology(ICEMIT 2018)
作者: Hui Baofeng Jia Guoqing Chen Shanji Qinghai University for Nationalities
To strengthen data privacy protection, and improve data mining accuracy, random response mode is adopted to design privacy protection mining method based on association rules. Granular computing method and technology ... 详细信息
来源: 评论
Interoperability of Relationship- and Role-Based Access Control  16
Interoperability of Relationship- and Role-Based Access Cont...
收藏 引用
6th acm conference on data and application security and privacy (codaspy)
作者: Rizvi, Syed Zain R. Fong, Philip W. L. Univ Calgary Calgary AB T2N 1N4 Canada
Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose, application-layer access control paradigm, such that authorization decisions are based on the relationship between the access reque... 详细信息
来源: 评论
Detecting Malicious Exploit Kits using Tree-based Similarity Searches  16
Detecting Malicious Exploit Kits using Tree-based Similarity...
收藏 引用
6th acm conference on data and application security and privacy (codaspy)
作者: Taylor, Teryl Hu, Xin Wang, Ting Jang, Jiyong Stoecklin, Marc Ph. Monrose, Fabian Sailer, Reiner Univ North Carolina Chapel Hill Chapel Hill NC 27514 USA IBM TJ Watson Res Ctr Armonk NY 10504 USA Lehigh Univ Bethlehem PA USA
Unfortunately, the computers we use for everyday activities can be infiltrated while simply browsing innocuous sites that, unbeknownst to the website owner, may be laden with malicious advertisements. So-called malver... 详细信息
来源: 评论
Big data security and privacy  15
Big data security and privacy
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: thuraisingham, Bhavani University of Texas at Dallas United States
this paper describes the issues surrounding big data security and privacy and provides a summary of the National Science Foundation sponsored workshop on this topic held in Dallas, Texas on September 16-17, 2014. Our ... 详细信息
来源: 评论
An Improved Apriori Preserving Differential privacy in the Framework of Spark
An Improved Apriori Preserving Differential Privacy in the F...
收藏 引用
2016 International conference on Communications, Information Management and Network security (CIMNS2016)
作者: Zhiqiang Gao Longjun Zhang Renyuan Hu Qingpeng Li Jihua Yang Department of Information Engineering University of CAPF
Aimed at the problem that traditional methods fail to deal with malicious attacks under arbitrary background knowledge during the process of massive data analysis, an improved Apriori algorithm preserving differential... 详细信息
来源: 评论
On quantitative dynamic data flow tracking  14
On quantitative dynamic data flow tracking
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Lovat, Enrico Oudinet, Johan Pretschner, Alexander Technische Universität München Germany
We present a non-probabilistic model for dynamic quantitative data flow tracking. Estimations of the amount of data stored in a particular representation at runtime - a file, a window, a network packet - enable the ad... 详细信息
来源: 评论
Minimizing lifetime of sensitive data in concurrent programs  14
Minimizing lifetime of sensitive data in concurrent programs
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Gondi, Kalpana Sistla, A. Prasad Venkatakrishnan, V.N. Department of Computer Science University of Illinois Chicago United States
the prolonged lifetime of sensitive data (such as passwords) in applications gives rise to several security risks. A promising approach is to erase sensitive data in an "eager fashion", i.e., as soon as its ... 详细信息
来源: 评论
Detecting man-in-the-middle attacks on non-mobile systems  14
Detecting man-in-the-middle attacks on non-mobile systems
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Vallivaara, Visa Sailio, Mirko Halunen, Kimmo VTT Technical Research Center of Finland Finland
In this paper we propose a method for detecting man-in-themiddle attacks using the timestamps of TCP packet headers. From these timestamps, the delays can be calculated and by comparing the mean of the delays in the c... 详细信息
来源: 评论