咨询与建议

限定检索结果

文献类型

  • 518 篇 会议
  • 28 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 443 篇 工学
    • 386 篇 计算机科学与技术...
    • 246 篇 软件工程
    • 90 篇 信息与通信工程
    • 47 篇 控制科学与工程
    • 37 篇 电气工程
    • 32 篇 安全科学与工程
    • 21 篇 生物工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 14 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 12 篇 建筑学
    • 11 篇 机械工程
    • 10 篇 土木工程
    • 9 篇 光学工程
    • 9 篇 化学工程与技术
  • 128 篇 理学
    • 67 篇 数学
    • 37 篇 物理学
    • 22 篇 生物学
    • 13 篇 系统科学
    • 13 篇 统计学(可授理学、...
  • 67 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 22 篇 医学
    • 20 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 公共卫生与预防医...
  • 16 篇 法学
    • 12 篇 社会学
  • 9 篇 经济学
  • 7 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 42 篇 security
  • 20 篇 network security
  • 17 篇 privacy
  • 14 篇 cryptography
  • 12 篇 access control
  • 10 篇 computer archite...
  • 9 篇 data privacy
  • 8 篇 computer securit...
  • 8 篇 machine learning
  • 7 篇 internet of thin...
  • 7 篇 computer communi...
  • 7 篇 authentication
  • 7 篇 cybersecurity
  • 6 篇 cyber security
  • 6 篇 security systems
  • 6 篇 computers
  • 6 篇 semantics
  • 6 篇 biometrics
  • 6 篇 correlation
  • 6 篇 cryptology

机构

  • 4 篇 school of comput...
  • 3 篇 tu wien austria
  • 3 篇 city graduate sc...
  • 3 篇 faculty of compu...
  • 3 篇 department of co...
  • 3 篇 faculty of infor...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 3 篇 hamburg universi...
  • 2 篇 school of comput...
  • 2 篇 huazhong univ sc...
  • 2 篇 state grid gansu...
  • 2 篇 institute for in...
  • 2 篇 ut san antonio u...
  • 2 篇 lanzhou city uni...
  • 2 篇 department of co...
  • 2 篇 cispa helmholtz ...
  • 2 篇 school of electr...
  • 2 篇 nanchang institu...
  • 2 篇 carleton univ sc...

作者

  • 5 篇 goyal s.b.
  • 4 篇 susilo willy
  • 4 篇 rajawat anand si...
  • 4 篇 zhou jianying
  • 3 篇 nakauchi shigeki
  • 3 篇 meadows catherin...
  • 3 篇 pais alwyn rosha...
  • 3 篇 kotenko igor
  • 3 篇 joaquin garcia-a...
  • 3 篇 saeed khalid
  • 3 篇 matthews suzanne...
  • 2 篇 adetoye adedayo
  • 2 篇 meseguer josé
  • 2 篇 abadi m
  • 2 篇 cardelli l
  • 2 篇 minematsu kazuhi...
  • 2 篇 nora cuppens-bou...
  • 2 篇 marek pawlicki
  • 2 篇 sarigiannidis pa...
  • 2 篇 xiang yang

语言

  • 528 篇 英文
  • 25 篇 其他
  • 6 篇 中文
检索条件"任意字段=5th European Symposium on Research in Computer Security"
559 条 记 录,以下是101-110 订阅
排序:
Approximate Convolutional Neural Networks Based on Dynamic Binding Windows
Approximate Convolutional Neural Networks Based on Dynamic B...
收藏 引用
CSI symposium on Real-Time and Embedded Systems and Technologies (RTEST)
作者: Morteza Adelkhani Mehdi Sedighi Computer Engineering Amirkabir University of Technology Tehran Iran
the rapid growth of applications focused on handling amounts of data has increased the demand, for computational power especially in areas such as machine learning and graph analysis within big data frameworks. While ... 详细信息
来源: 评论
Implementing GDPR in Social Networks Using Trust and Context  5th
Implementing GDPR in Social Networks Using Trust and Context
收藏 引用
5th International symposium on Cyber security Cryptography and Machine Learning (CSCML)
作者: Voloch, Nadav Gudes, Ehud Gal-Oz, Nurit Ben Gurion Univ Negev POB 653 IL-8410501 Beer Sheva Israel Sapir Acad Coll IL-79165 Sderot Israel
the GDPR (General Data Protection Regulation) is a regulation for data protection and privacy for citizens of the EU. It also addresses the export of personal data outside the EU, thus creating a regulation the affect... 详细信息
来源: 评论
Bestie: Very Practical Searchable Encryption with Forward and Backward security  26th
Bestie: Very Practical Searchable Encryption with Forward an...
收藏 引用
26th european symposium on research in computer security (ESORICS) / 16th Data Privacy Management International Workshop (DPM) / 5th International Workshop on Cryptocurrencies and Blockchain Technology (CBT)
作者: Chen, Tianyang Xu, Peng Wang, Wei Zheng, Yubo Susilo, Willy Jin, Hai Huazhong Univ Sci & Technol Natl Engn Res Ctr Big Data Technol & Syst Hubei Engn Res Ctr Big Data Secur Sch Cyber Sci & EngnServ Comp Technol & Syst Lab Wuhan 430074 Peoples R China Huazhong Univ Sci & Technol Sch Comp Sci & Technol Cyber Phys Social Syst Lab Wuhan 430074 Peoples R China Univ Wollongong Sch Comp & Informat Technol Inst Cybersecur & Cryptol Wollongong NSW Australia
Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their efforts to ... 详细信息
来源: 评论
International Workshop on Cyber Range Technologies and Applications (CACOE 2020)  5
International Workshop on Cyber Range Technologies and Appli...
收藏 引用
5th IEEE european symposium on security and Privacy Workshops, Euro S and PW 2020
作者: Leitner, Maria Sommestad, Teodor Center for Digital Safety Security AIT Austrian Institute of Technology Vienna Austria C4ISR Swedish Defence Research Agency FOI Linköping Sweden
来源: 评论
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis  1
收藏 引用
5th International symposium on Cyber security Cryptography and Machine Learning (CSCML)
作者: Liagkou, Vasiliki Nastou, Panagiotis E. Spirakis, Paul Stamatiou, Yannis C. Univ Patras Campus Comp Technol Inst & Press Diophantus Patras 26504 Greece Univ Liverpool Dept Comp Sci Liverpool England Univ Patras Comp Engn & Informat Dept Patras 26504 Greece Univ Patras Dept Business Adm Patras 26504 Greece Univ Ioannina Dept Informat & Telecommun Koatakioi Arta 47100 Greece Univ Aegean Dept Math Appl Math & Math Modeling Lab Samos Greece
the formal study of computer malware was initiated in the seminal work of Fred Cohen in the mid 80s who applied elements of the theory of Computation in the investigation of the theoretical limits of using the Turing ... 详细信息
来源: 评论
Edge Partitions of Complete Geometric Graphs  38
Edge Partitions of Complete Geometric Graphs
收藏 引用
38th International symposium on Computational Geometry, SoCG 2022
作者: Aichholzer, Oswin Obenaus, Johannes Orthaber, Joachim Paul, Rosna Schnider, Patrick Steiner, Raphael Taubner, Tim Vogtenhuber, Birgit Institute of Software Technology Technische Universität Graz Austria Department of Computer Science Freie Universität Berlin Germany Department of Mathematical Sciences University of Copenhagen Denmark Department of Computer Science ETH Zürich Switzerland
In this paper, we disprove the long-standing conjecture that any complete geometric graph on 2n vertices can be partitioned into n plane spanning trees. Our construction is based on so-called bumpy wheel sets. We full... 详细信息
来源: 评论
Multi-modal cooperative awareness of connected and automated vehicles in smart cities  5
Multi-modal cooperative awareness of connected and automated...
收藏 引用
5th IEEE International Conference on Smart Internet of things, SmartIoT 2021
作者: Piperigkos, Nikos Lalos, Aris S. Berberidis, Kostas Computer Engineering and Informatics Department University of Patras Greece Industrial Systems Institute Athena Research Center Patras Greece
Cooperative autonomous driving in 5G and smart cities environment is expected to further improve safety, security and efficiency of transportation systems. To this end, involved vehicles is imperative to have accurate... 详细信息
来源: 评论
MTD: Run-time System Call Mapping Randomization  5
MTD: Run-time System Call Mapping Randomization
收藏 引用
5th International symposium on computer Science and Intelligent Controls (ISCSIC)
作者: Masumoto, Takeshi Oo, Wai Kyi Kyi Koide, Hiroshi Kyushu Univ Grad Sch Informat Sci & Elect Engn Fukuoka 8190385 Japan Kyushu Univ Res Inst Informat Technol Fukuoka 8190385 Japan
the purpose of our research is to provide defense against code injection attacks on the system. Code injection attack is one of the most dangerous attacks to a system, which can even give an attacker a chance to fully... 详细信息
来源: 评论
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method  5th
Trust <i>and</i> Verify: A Complexity-Based IoT Behavioral E...
收藏 引用
5th International symposium on Cyber security Cryptography and Machine Learning (CSCML)
作者: Haefner, Kyle Ray, Indrakshi Colorado State Univ Ft Collins CO 80523 USA
In an Internet of things (IoT) environment, devices may become compromised by cyber or physical attacks causing security and privacy breaches. When a device is compromised, its network behavior changes. In an IoT envi... 详细信息
来源: 评论
thermal Management in Large Data Centres: security threats and Mitigation  1
收藏 引用
8th International symposium on security in Computing and Communications, SSCC 2020
作者: Saridou, Betty Bendiab, Gueltoum Shiaeles, Stavros N. Papadopoulos, Basil K. Democritus University of Thrace Xanthi Greece Cyber Security Research Group University of Portsmouth Portsmouth United Kingdom
Data centres are experiencing significant growth in their scale, especially, with the ever-increasing demand for cloud and IoT services. However, this rapid growth has raised numerous security issues and vulnerabiliti... 详细信息
来源: 评论