咨询与建议

限定检索结果

文献类型

  • 519 篇 会议
  • 26 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 558 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 443 篇 工学
    • 384 篇 计算机科学与技术...
    • 246 篇 软件工程
    • 91 篇 信息与通信工程
    • 48 篇 控制科学与工程
    • 36 篇 电气工程
    • 32 篇 安全科学与工程
    • 21 篇 生物工程
    • 17 篇 电子科学与技术(可...
    • 17 篇 网络空间安全
    • 14 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 12 篇 建筑学
    • 11 篇 机械工程
    • 10 篇 土木工程
    • 9 篇 光学工程
    • 9 篇 化学工程与技术
  • 126 篇 理学
    • 66 篇 数学
    • 37 篇 物理学
    • 21 篇 生物学
    • 13 篇 系统科学
    • 12 篇 统计学(可授理学、...
  • 67 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 21 篇 医学
    • 20 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 16 篇 法学
    • 12 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 security
  • 19 篇 network security
  • 16 篇 privacy
  • 14 篇 cryptography
  • 12 篇 access control
  • 9 篇 data privacy
  • 9 篇 computer archite...
  • 8 篇 machine learning
  • 7 篇 internet of thin...
  • 7 篇 computer communi...
  • 7 篇 computer securit...
  • 7 篇 authentication
  • 7 篇 cybersecurity
  • 6 篇 cyber security
  • 6 篇 security systems
  • 6 篇 computers
  • 6 篇 semantics
  • 6 篇 biometrics
  • 6 篇 correlation
  • 6 篇 cryptology

机构

  • 4 篇 school of comput...
  • 3 篇 tu wien austria
  • 3 篇 city graduate sc...
  • 3 篇 faculty of compu...
  • 3 篇 department of co...
  • 3 篇 faculty of infor...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 3 篇 hamburg universi...
  • 2 篇 school of comput...
  • 2 篇 huazhong univ sc...
  • 2 篇 state grid gansu...
  • 2 篇 institute for in...
  • 2 篇 ut san antonio u...
  • 2 篇 lanzhou city uni...
  • 2 篇 department of co...
  • 2 篇 cispa helmholtz ...
  • 2 篇 school of electr...
  • 2 篇 nanchang institu...
  • 2 篇 carleton univ sc...

作者

  • 5 篇 goyal s.b.
  • 4 篇 susilo willy
  • 4 篇 rajawat anand si...
  • 4 篇 zhou jianying
  • 3 篇 nakauchi shigeki
  • 3 篇 meadows catherin...
  • 3 篇 pais alwyn rosha...
  • 3 篇 kotenko igor
  • 3 篇 joaquin garcia-a...
  • 3 篇 saeed khalid
  • 3 篇 matthews suzanne...
  • 2 篇 adetoye adedayo
  • 2 篇 meseguer josé
  • 2 篇 abadi m
  • 2 篇 cardelli l
  • 2 篇 minematsu kazuhi...
  • 2 篇 nora cuppens-bou...
  • 2 篇 marek pawlicki
  • 2 篇 sarigiannidis pa...
  • 2 篇 xiang yang

语言

  • 544 篇 英文
  • 8 篇 其他
  • 6 篇 中文
检索条件"任意字段=5th European Symposium on Research in Computer Security"
558 条 记 录,以下是81-90 订阅
排序:
Using TPM to ensure security, trust and privacy (STP) in VANET  5
Using TPM to ensure security, trust and privacy (STP) in VAN...
收藏 引用
5th National symposium on Information Technology: Towards New Smart World, NSITNSW 2015
作者: Sumra, Irshad Ahmed Hasbullah, Halabi Bin Manan, Jamalul-Lail Ab Computer and Information Sciences Department Universiti Teknologi PETRONAS Malaysia MIMOS Berhad Malaysia
Safety and non-safety applications of VANET provides solutions for road accidents in current traffic system. security is one of the key research area for successful implementation of safety and non-safety applications... 详细信息
来源: 评论
Data modelling of an action environment for information warfare
Data modelling of an action environment for information warf...
收藏 引用
5th european Conference on Information Warfare and security 2006, ECIW 2006
作者: Kuokkanen, Pertti Department of Computer Science University of Helsinki Finland
this research paper has been prepared to present an outline of action environment and to indicate the basis for modelling methods. Furthermore, this study produces action environment models for an anticipatory decisio... 详细信息
来源: 评论
A Formal Statement of the MMS security Model  5
A Formal Statement of the MMS Security Model
收藏 引用
5th IEEE symposium on security and Privacy, SP 1984
作者: McLean, John Landwehr, Carl E. Heitmeyer, Constance L. Computer Science and Systems Branch Information Technology Division Naval Research Laboratory WashingtonDC20375 United States
To provide a firm foundation for proofs about the security properties of a system specification or implementation, a formal statement of its security model is needed. this paper presents a formal model that correspond... 详细信息
来源: 评论
research on Anti-Jamming Technology of Wireless Communication Based on Alliance Formation Game  5
Research on Anti-Jamming Technology of Wireless Communicatio...
收藏 引用
5th International symposium on computer Engineering and Intelligent Communications, ISCEIC 2024
作者: Zhu, Xiaoqin Yang, Yong Liu, Gaohe Li, Wenhui Ma, Shengguo Liu, Yujia State Grid Gansu Electric Power Research Institute Lanzhou China State Grid Gansu Electric Power Company Dingxi China China Gridcom Co. Ltd Shenzhen China
As communication jamming technology advances, malicious methods grow more efficient and intelligent, challenging wireless system reliability and security. Traditional anti-jamming methods falter in complex environment... 详细信息
来源: 评论
A Formal security Analysis of Session Resumption Across Hostnames  26th
A Formal Security Analysis of Session Resumption Across Host...
收藏 引用
26th european symposium on research in computer security (ESORICS) / 16th Data Privacy Management International Workshop (DPM) / 5th International Workshop on Cryptocurrencies and Blockchain Technology (CBT)
作者: Gellert, Kai Handirk, Tobias Berg Univ Wuppertal Wuppertal Germany
the TLS 1.3 session resumption handshakes enables a client and a server to resume a previous connection via a shared secret, which was established during a previous session. In practice, this is often done via session... 详细信息
来源: 评论
Seeking answers, making sense, changing lifestyles: Cognitive models of human-information interaction  14
Seeking answers, making sense, changing lifestyles: Cognitiv...
收藏 引用
5th Information Interaction in Context symposium, IIiX 2014
作者: Pirolli, Peter Palo Alto Research Center 3333 Coyote Hill Road Palo Alto CA 94304 United States
this presentation will discuss complex human-information interaction problems involving information foraging, sensemaking, and lifestyle change (behavior change), predictive models of human cognition in these contexts... 详细信息
来源: 评论
GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS  7th
GLASS: Towards Secure and Decentralized eGovernance Services...
收藏 引用
26th european symposium on research in computer security (ESORICS) / 16th Data Privacy Management International Workshop (DPM) / 5th International Workshop on Cryptocurrencies and Blockchain Technology (CBT)
作者: Chrysoulas, Christos thomson, Amanda Pitropakis, Nikolaos Papadopoulos, Pavlos Lo, Owen Buchanan, William J. Domalis, George Karacapilidis, Nikos Tsakalidis, Dimitris Tsolis, Dimitris Edinburgh Napier Univ Sch Comp Blockpass ID Lab Edinburgh EH10 5DT Midlothian Scotland Univ Patras Comp Engn & Informat Dept Patras Greece
the continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. this innovation led them to an era of automation, broadened the attack surface and made them a p... 详细信息
来源: 评论
Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems  7th
Attack Path Analysis and Cost-Efficient Selection of Cyberse...
收藏 引用
26th european symposium on research in computer security (ESORICS) / 16th Data Privacy Management International Workshop (DPM) / 5th International Workshop on Cryptocurrencies and Blockchain Technology (CBT)
作者: Spathoulas, Georgios Kavallieratos, Georgios Katsikas, Sokratis Baiocco, Alessio Norwegian Univ Sci & Technol Dept Informat Secur & Commun Technol Gjovik Norway
the increasing integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other. this in... 详细信息
来源: 评论
Toward an Understanding of Extensible Architectures for Evaluated Trusted computer System Products  5
Toward an Understanding of Extensible Architectures for Eval...
收藏 引用
5th IEEE symposium on security and Privacy, SP 1984
作者: Schaefer, Marvin Schell, Roger R. DoD Computer Security Center Fort George G. Meade MD United States
It has been a tenet of the computer security research and development community that policy enforcement mechanisms must be designed into systems at the time of their conception rather than retrofitted on to existing s... 详细信息
来源: 评论
BCHJam: a Brain-computer Music Interface for Live Music Performance in Shared Mixed Reality Environments  5
BCHJam: a Brain-Computer Music Interface for Live Music Perf...
收藏 引用
5th IEEE International symposium on the Internet of Sounds (IEEE IS2)
作者: Romani, Michele Giudici, Gregorio Andrea Stefani, Domenico Zanoni, Devis Boem, Alberto Turchet, Luca Univ Trento Dept Informat Engn & Comp Sci Trento Italy
To date, the integration of brain-computer interfaces and mixed reality headsets in Internet of Musical things (IoMusT) performance ecosystems has received remarkably little attention from the research community. To b... 详细信息
来源: 评论