咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 26 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 558 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 443 篇 工学
    • 384 篇 计算机科学与技术...
    • 246 篇 软件工程
    • 91 篇 信息与通信工程
    • 48 篇 控制科学与工程
    • 36 篇 电气工程
    • 32 篇 安全科学与工程
    • 21 篇 生物工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 14 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 12 篇 建筑学
    • 11 篇 机械工程
    • 10 篇 土木工程
    • 9 篇 光学工程
    • 9 篇 化学工程与技术
  • 126 篇 理学
    • 66 篇 数学
    • 37 篇 物理学
    • 21 篇 生物学
    • 13 篇 系统科学
    • 12 篇 统计学(可授理学、...
  • 67 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 21 篇 医学
    • 20 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 16 篇 法学
    • 12 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 security
  • 19 篇 network security
  • 16 篇 privacy
  • 14 篇 cryptography
  • 12 篇 access control
  • 9 篇 data privacy
  • 9 篇 computer archite...
  • 8 篇 machine learning
  • 7 篇 internet of thin...
  • 7 篇 computer communi...
  • 7 篇 computer securit...
  • 7 篇 authentication
  • 7 篇 cybersecurity
  • 6 篇 cyber security
  • 6 篇 security systems
  • 6 篇 computers
  • 6 篇 semantics
  • 6 篇 biometrics
  • 6 篇 correlation
  • 6 篇 cryptology

机构

  • 4 篇 school of comput...
  • 3 篇 tu wien austria
  • 3 篇 city graduate sc...
  • 3 篇 faculty of compu...
  • 3 篇 department of co...
  • 3 篇 faculty of infor...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 3 篇 hamburg universi...
  • 2 篇 school of comput...
  • 2 篇 huazhong univ sc...
  • 2 篇 state grid gansu...
  • 2 篇 institute for in...
  • 2 篇 ut san antonio u...
  • 2 篇 lanzhou city uni...
  • 2 篇 department of co...
  • 2 篇 cispa helmholtz ...
  • 2 篇 school of electr...
  • 2 篇 nanchang institu...
  • 2 篇 carleton univ sc...

作者

  • 5 篇 goyal s.b.
  • 4 篇 susilo willy
  • 4 篇 rajawat anand si...
  • 4 篇 zhou jianying
  • 3 篇 nakauchi shigeki
  • 3 篇 meadows catherin...
  • 3 篇 pais alwyn rosha...
  • 3 篇 kotenko igor
  • 3 篇 joaquin garcia-a...
  • 3 篇 saeed khalid
  • 3 篇 matthews suzanne...
  • 2 篇 adetoye adedayo
  • 2 篇 meseguer josé
  • 2 篇 abadi m
  • 2 篇 cardelli l
  • 2 篇 minematsu kazuhi...
  • 2 篇 nora cuppens-bou...
  • 2 篇 marek pawlicki
  • 2 篇 sarigiannidis pa...
  • 2 篇 xiang yang

语言

  • 544 篇 英文
  • 8 篇 其他
  • 6 篇 中文
检索条件"任意字段=5th European Symposium on Research in Computer Security"
558 条 记 录,以下是1-10 订阅
排序:
5th european symposium on research in computer security, ESORICS 1998
5th European Symposium on Research in Computer Security, ESO...
收藏 引用
5th european symposium on research in computer security, ESORICS 1998
the proceedings contain 24 papers. the special focus in this conference is on research in computer security. the topics include: Fixed vs. variable-length patterns for detecting suspicious process behavior;a tool for ...
来源: 评论
5th International Workshop on Attacks and Defenses for Internet-of-things, ADIoT 2022, held in conjunction with 27th european symposium on research in computer security, ESORICS 2022
5th International Workshop on Attacks and Defenses for Inter...
收藏 引用
5th International Workshop on Attacks and Defenses for Internet-of-things, ADIoT 2022, held in conjunction with 27th european symposium on research in computer security, ESORICS 2022
the proceedings contain 10 papers. the special focus in this conference is on Attacks and Defenses for Internet-of-things. the topics include: Evolving a Boolean Masked Adder Using Neuroevolution;constraints and&...
来源: 评论
5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, co-located with the 27th european symposium on research in computer security, ESORICS 2022
5th International Workshop on Emerging Technologies for Auth...
收藏 引用
5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, co-located with the 27th european symposium on research in computer security, ESORICS 2022
the proceedings contain 9 papers. the special focus in this conference is on Emerging Technologies for Authorization and Authentication. the topics include: User Authentication on Headset-Like Devices by Bio...
来源: 评论
5th International Workshop on security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the 3rd International Workshop on security and Privacy Requirements Engineering, SECPRE 2019, the 1st International Workshop on security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the 2nd International Workshop on Attacks and Defenses for Internet-of-things, ADIoT 2019, held in conjunction with the 24th european symposium on research in computer security, ESORICS 2019
5th International Workshop on Security of Industrial Control...
收藏 引用
5th International Workshop on security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the 3rd International Workshop on security and Privacy Requirements Engineering, SECPRE 2019, the 1st International Workshop on security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the 2nd International Workshop on Attacks and Defenses for Internet-of-things, ADIoT 2019, held in conjunction with the 24th european symposium on research in computer security, ESORICS 2019
the proceedings contain 27 papers. the special focus in this conference is on security of Industrial Control Systems and Cyber-Physical Systems. the topics include: ADIoT 2019 preface;anomaly detection for industrial ...
来源: 评论
security Orchestration in 5G and Beyond Smart Network Technologies
IEEE Open Journal of the Computer Society
收藏 引用
IEEE Open Journal of the computer Society 2025年 第1期6卷 554-573页
作者: Batewela, Sadeep Liyanage, Madhusanka Zeydan, Engin Ylianttila, Mika Ranaweera, Pasika University of Oulu Center for Wireless Communications Oulu90014 Finland School of Computer Science Dublin 4 Ireland Centre Tecnològic de Telecomunicacions de Catalunya Barcelona08860 Spain School of Electrical and Electronic Engineering Dublin 4 Ireland
security Orchestration (SCO) represents a pivotal element in achieving intelligent and automated security monitoring and management within intricate and dynamic network environments, notably the 5th Generation (5G) an... 详细信息
来源: 评论
Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol  19th
Homomorphic Encryption Based ECDSA Generation Over Five Part...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th european symposium on research in computer security, ESORICS 2024
作者: Aggarwal, Akshit Swain, Srinibas Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India School of Computer and Mathematical Sciences University of Adelaide Adelaide Australia
Secure computation of multiparty protocol (MPP) is being widely used to address privacy issues in various technologies, such as cryptocurrencies, blockchain, and many more. the security of MPP is computed in various s... 详细信息
来源: 评论
Evaluation of Machine Learning Algorithm and SMOTE for Insider threat Detection  5th
Evaluation of Machine Learning Algorithm and SMOTE for Insid...
收藏 引用
5th International symposium on Intelligent Computing Systems
作者: Ojo, Daniel Al-Mhiqani, Mohammed Al-Aqrabi, Hussain Al-Shehari, Taher Univ Huddersfield Dept Comp Sci Huddersfield HD1 3DH W Yorkshire England Higher Coll Technol Dept Comp Informat Sci POB 7947 Sharjah U Arab Emirates King Saud Univ Dept Self Dev Skill Comp Skills Riyadh 11362 Saudi Arabia
Insider threats represent a significant risk to organizational security, characterized by their covert nature and the complexity of detecting malicious activities within legitimate user behavior. Traditional detection... 详细信息
来源: 评论
28th european symposium on research in computer security, ESORICS 2023
28th European Symposium on Research in Computer Security, ES...
收藏 引用
28th european symposium on research in computer security, ESORICS 2023
the proceedings contain 93 papers. the special focus in this conference is on research in computer security. the topics include: Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Valida...
来源: 评论
28th european symposium on research in computer security, ESORICS 2023
28th European Symposium on Research in Computer Security, ES...
收藏 引用
28th european symposium on research in computer security, ESORICS 2023
the proceedings contain 93 papers. the special focus in this conference is on research in computer security. the topics include: Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Valida...
来源: 评论
28th european symposium on research in computer security, ESORICS 2023
28th European Symposium on Research in Computer Security, ES...
收藏 引用
28th european symposium on research in computer security, ESORICS 2023
the proceedings contain 93 papers. the special focus in this conference is on research in computer security. the topics include: Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Valida...
来源: 评论