咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 1 册 图书

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 41 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 5 篇 信息与通信工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 6 篇 security
  • 6 篇 privacy
  • 4 篇 differential pri...
  • 2 篇 secret sharing
  • 2 篇 homomorphic encr...
  • 2 篇 data privacy
  • 2 篇 spoofing
  • 2 篇 web security
  • 1 篇 iso
  • 1 篇 life cycle asses...
  • 1 篇 internet of thin...
  • 1 篇 dropbox
  • 1 篇 smart homes
  • 1 篇 intrusion detect...
  • 1 篇 traffic analysis
  • 1 篇 lattice-based cr...
  • 1 篇 trust models
  • 1 篇 graphs
  • 1 篇 hijacking
  • 1 篇 scalability

机构

  • 2 篇 north carolina s...
  • 1 篇 fdn bruno kessle...
  • 1 篇 telfer school of...
  • 1 篇 univ coimbra cis...
  • 1 篇 stevens inst tec...
  • 1 篇 public research ...
  • 1 篇 univ toronto on
  • 1 篇 school of cybers...
  • 1 篇 inst technol & s...
  • 1 篇 seeburger ag 6 g...
  • 1 篇 us mil acad dept...
  • 1 篇 ecole polytech f...
  • 1 篇 univ roma la sap...
  • 1 篇 swiss fed inst t...
  • 1 篇 umass boston bos...
  • 1 篇 univ waterloo ec...
  • 1 篇 florida polytech...
  • 1 篇 soochow univ peo...
  • 1 篇 school of comput...
  • 1 篇 univ illinois ur...

作者

  • 2 篇 enck william
  • 1 篇 samet saeed
  • 1 篇 kostiainen kari
  • 1 篇 sharma anupam
  • 1 篇 poupart claude
  • 1 篇 baldoni roberto
  • 1 篇 balmau oana
  • 1 篇 gu xiaohui
  • 1 篇 egecioglu omer
  • 1 篇 fragopoulou para...
  • 1 篇 capkun srdjan
  • 1 篇 wang xiao
  • 1 篇 forg fabian
  • 1 篇 mannan mohammad
  • 1 篇 petrova-antonova...
  • 1 篇 el abbadi amr
  • 1 篇 che jiazhen
  • 1 篇 durand arnaud
  • 1 篇 ahmadi mansour
  • 1 篇 wehrle klaus

语言

  • 45 篇 英文
检索条件"任意字段=7th ACM Conference on Data and Application Security and Privacy, CODASPY 2017"
45 条 记 录,以下是31-40 订阅
排序:
Research Issues and Approaches for Connected and Automated Vehicles  17
Research Issues and Approaches for Connected and Automated V...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Shin, Kang G. Univ Michigan Ann Arbor Ann Arbor MI 48109 USA
Driverless and/or environment-friendly cars have recently received a great deal of attention from media and almost all industry and government sectors due mainly to their great potential impacts on safety, economy, an... 详细信息
来源: 评论
the Human Capital Model for security Research New Insights into Technology Transition  17
The Human Capital Model for Security Research New Insights i...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Rajagopalan, S. Raj Honeywell Phoenix AZ 85034 USA
As a security researcher, have you ever wondered how much of security research that is done and presented at research conferences is ever used by practitioners or is incorporated into products? Four years ago we forme... 详细信息
来源: 评论
Statistical security Incident Forensics against data Falsification in Smart Grid Advanced Metering Infrastructure  17
Statistical Security Incident Forensics against Data Falsifi...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Bhattacharjee, Shameek thakur, Aditya Silvestri, Simone Das, Sajal K. Missouri Univ Sci & Technol Dept Comp Sci Rolla MO 65409 USA Missouri Univ Sci & Technol Dept Elect Engn Rolla MO 65409 USA
Compromised smart meters reporting false power consumption data in Advanced Metering Infrastructure (AMI) may have drastic consequences on a smart grid's operations. Most existing works only deal with electricity ... 详细信息
来源: 评论
Hidden privacy Risks in Sharing Pictures on Social Media  8
Hidden Privacy Risks in Sharing Pictures on Social Media
收藏 引用
8th International conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN) / 7th International conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICth)
作者: Ghazinour, Kambiz Ponchak, John Kent State Univ Dept Comp Sci Adv Informat Secur & Privacy Lab Kent OH 44242 USA
Shared pictures, videos and more constitute as shared media in todays world of social networks. Each piece of media shared has hidden privacy violations stored in their metadata. Over the past two decades, social medi... 详细信息
来源: 评论
A Secure, privacy-Preserving IoT Middleware Using Intel SGX  17
A Secure, Privacy-Preserving IoT Middleware Using Intel SGX
收藏 引用
7th International conference on the Internet of things
作者: Gremaud, Pascal Durand, Arnaud Pasquier, Jacques Univ Fribourg Fribourg Switzerland
With Internet of things (IoT) middleware solutions moving towards cloud computing, the problems of trust in cloud platforms and data privacy need to be solved. the emergence of Trusted Execution Environments (TEEs) op... 详细信息
来源: 评论
Study of Smart Home Communication Protocol's and security & privacy Aspects  7
Study of Smart Home Communication Protocol's and security & ...
收藏 引用
7th International conference on Communication Systems and Network Technologies (CSNT)
作者: Ray, Abhay Kumar Bagwari, Ashish Inst Technol & Sci Dept IT Ghaziabad India UTU WIT Elect & Commun Engn Dept Dehra Dun Uttar Pradesh India
the IoT (Internet-of-things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and ... 详细信息
来源: 评论
E-Technologies: Embracing the Internet of things  1st ed. 2017
收藏 引用
丛书名: Lecture Notes in Business Information Processing
2017年
作者: Esma Aïmeur Umar Ruhi Michael Weiss
this book constitutes the refereed proceedings of the 7th International conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017. this years conference drew special attention to the ever-inc...
来源: 评论
An Ontological Template for Context Expressions in Attribute-based Access Control Policies  7
An Ontological Template for Context Expressions in Attribute...
收藏 引用
7th International conference on Cloud Computing and Services Science (CLOSER)
作者: Veloudis, Simeon Paraskakis, Iraklis Petsos, Christos Verginadis, Yiannis Patiniotakis, Ioannis Mentzas, Gregoris Univ Sheffield Int Fac CITY Coll SEERC Thessaloniki Greece Natl Tech Univ Athens Inst Commun & Comp Syst Athens Greece
By taking up the cloud computing paradigm enterprises are able to realise significant cost savings whilst increasing their agility and productivity. However, due to security concerns, many enterprises are reluctant to... 详细信息
来源: 评论
Unified connectivity of IoT devices through abstraction of application protocols  2017
Unified connectivity of IoT devices through abstraction of a...
收藏 引用
7th International conference on Information Communication and Management, ICICM 2017
作者: Petrova-Antonova, Dessislava Andreev, Georgi Ilieva, Sylvia Sofia University 125 Tsarigradsko shoes Blvd. Sofia1113 Bulgaria SEEBURGER AG 6 Grigorii Gorbatenko Str. Sofia Bulgaria
Internet of things comes with significant benefits in human live and work, but it brings plenty of challenges. Providing security in the IoT network is a primary priority. the connected devices and the data they excha... 详细信息
来源: 评论
Hey Doc, Is this Normal?: Exploring Android Permissions in the Post Marshmallow Era  1
收藏 引用
7th International conference on security, privacy, and Applied Cryptography Engineering (SPACE)
作者: Alepis, Efthimios Patsakis, Constantinos Univ Piraeus Dept Informat 80 Karaoli & Dimitriou Piraeus 18534 Greece
Billions of hand-held devices are used globally in daily basis. the main reasons for their wide adoption can be considered the introduction of various sensors that have completely reshaped user interaction standards a... 详细信息
来源: 评论