咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是991-1000 订阅
排序:
Poster: Understanding privacy concerns of WhatsApp users in India  5
Poster: Understanding privacy concerns of WhatsApp users in ...
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
作者: Dev, Jayati Das, Sanchari Camp, L Jean Indiana University Bloomington United States
WhatsApp, a leading platform for mobile messaging, with the largest user base being in India, incorporates features like Last Seen, Live Location, and sharing defaults which pose privacy challenges. Our study evaluate... 详细信息
来源: 评论
Vulnerability Detection in PHP Web application Using Lexical Analysis Approach with Machine Learning  5
Vulnerability Detection in PHP Web Application Using Lexical...
收藏 引用
5th International conference on data and Software Engineering (ICoDSE)
作者: Anbiya, Dhika Rizki Purwarianti, Ayu Asnar, Yudistira Agcy Assesment & Applicat Technol Lab Informat & Commun Technol Serv Tangerang Selatan Indonesia Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
security is an important aspect and continues becoming a challenging topic especially in a web application. Today, 78,9% of websites uses PHP as programming languages. As a popular language, WebApps written in PHP ten... 详细信息
来源: 评论
application of IoT in Smart Grid: Challenges and Solutions
Application of IoT in Smart Grid: Challenges and Solutions
收藏 引用
International conference of Signal Processing and Intelligent Systems (ICSPIS)
作者: Zahra Davoody-Beni Niloufar Sheini-Shahvand Hossein Shahinzadeh Majid Moazzami Mahdi Shaneh Gevork B. Gharehpetian Najafabad Branch Islamic Azad University Najafabad Iran Amirkabir University of Technology (Tehran Polytechnic) Tehran Iran Smart Microgrid Research Center Najafabad Branch Islamic Azad University Najafabad Iran
the prevailing development in energy grids and emersion of new energy players along with the advent of the Internet of things (IoT) lead available energy systems (e.g., smart electricity grid) toward “energy internet... 详细信息
来源: 评论
HR-Auth: Heart Rate data Authentication Using Consumer Wearables
HR-Auth: Heart Rate Data Authentication Using Consumer Weara...
收藏 引用
International conference on Mobile Software Engineering and Systems (MOBILESoft)
作者: Alfredo J. Perez Kevin G. Rivera-Morales Miguel A. Labrador Idalides Vergara-Laurens Columbus State University Universidad del Turabo University of South Florida
the following topics are dealt with: mobile computing; Android (operating system); smart phones; program testing; data privacy; security of data; learning (artificial intelligence); program debugging; user interfaces;... 详细信息
来源: 评论
5th European conference on Service-Oriented and Cloud Computing, ESOCC 2016
5th European Conference on Service-Oriented and Cloud Comput...
收藏 引用
5th European conference on Service-Oriented and Cloud Computing, ESOCC 2016
the proceedings contain 22 papers. the special focus in this conference is on Service-Oriented and Cloud Computing. the topics include: Consumer-driven API testing with performance contracts;patterns for workflow engi...
来源: 评论
Panel: Trustworthy data Science  17
Panel: Trustworthy Data Science
收藏 引用
7th acm conference on data and application security and privacy (CODASPY)
作者: Doupe, Adam Arizona State Univ Tempe AZ 85287 USA
Much of the research that our community publishes is based on data. However, an open question remains: are the results of data science trustworthy, and how can we increase our trust in data science? Accomplishing this... 详细信息
来源: 评论
SCC 2017 - proceedings of the 5th acm International Workshop on security in Cloud Computing, co-located with ASIA CCS 2017
SCC 2017 - Proceedings of the 5th ACM International Workshop...
收藏 引用
5th acm International Workshop on security in Cloud Computing, SCC 2017
the proceedings contain 11 papers. the topics discussed include: to cheat or not to cheat - a game-theoretic analysis of outsourced computation verification;reconciling security and functional requirements in multi-te...
来源: 评论
HACSAW: A trusted framework for cyber situational awareness  18
HACSAW: A trusted framework for cyber situational awareness
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
作者: Leonard, Leslie Glodek, William United States
the HPC Architecture for Cyber Situational Awareness (HACSAW) was established by the Department of Defense (DoD) High Performance Computing Modernization Program (HPCMP) to combine a rich computational environment wit... 详细信息
来源: 评论
5th International conference on Man-Machine Interactions, ICMMI 2017
5th International Conference on Man-Machine Interactions, IC...
收藏 引用
5th International conference on Man-Machine Interactions, ICMMI 2017
the proceedings contain 56 papers. the special focus in this conference is on Man-Machine Interactions. the topics include: Deep learning with dense random neural networks;a perceptually inspired method for enhancing ...
来源: 评论
Towards Practical privacy-Preserving Life Cycle Assessment Computations  17
Towards Practical Privacy-Preserving Life Cycle Assessment C...
收藏 引用
7th acm conference on data and application security and privacy (CODASPY)
作者: Sahin, Cetin Kuczenski, Brandon Egecioglu, Omer El Abbadi, Amr Univ Calif Santa Barbara Santa Barbara CA 93106 USA
Life Cycle Assessment(LCA) is crucial for evaluating the ecological sustainability of a product or service, and the accurate evaluation of sustainability requires detailed and transparent information about industrial ... 详细信息
来源: 评论