咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1041-1050 订阅
排序:
A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing  5
A Framework and the Design of Secure Mobile Cloud with Smart...
收藏 引用
5th IEEE International conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
作者: Cushman, Isaac J. Al Sadi, Md. Baitul Chen, Lei Haddad, Rami J. Georgia Southern Univ Dept Informat Technol Dept Elect Engn Statesboro GA 30460 USA
the use of mobile devices has exponentially expanded in recent years. A device which was made with the sole purpose of making mobile audio phone calls is now the leading basis for functionality in the social world. th... 详细信息
来源: 评论
Decline in Mobile application Life Cycle  5
Decline in Mobile Application Life Cycle
收藏 引用
5th International conference on Information Technology and Quantitative Management (ITQM)
作者: Vagrani, Anushruti Kumar, Niraj Ilavarasan, P. Vigneswara Indian Inst Technol Dept Management Studies Delhi 110016 India
Despite the popularity of mobile applications, the research regarding their usage and non-usage is scarce. With increasing competition, the application Life Cycle (ALC) is becoming smaller for a number of applications... 详细信息
来源: 评论
Cloud security and Jurisdiction: Need of the Hour  5th
Cloud Security and Jurisdiction: Need of the Hour
收藏 引用
5th International conference on Frontiers in Intelligent Computing - theory and applications (FICTA)
作者: Jena, Tamanna Mohanty, J. R. KIIT Univ Sch Comp Engn Bhubaneswar Orissa India KIIT Univ Sch Comp Applicat Bhubaneswar Orissa India
Features of cloud services that users' data is remotely in obscure machine is neither owned nor controlled by user. For adoption of services, from users' point of view, cloud security and arbitration are signi... 详细信息
来源: 评论
5th Annual privacy Forum, APF 2017
5th Annual Privacy Forum, APF 2017
收藏 引用
5th Annual privacy Forum, APF 2017
the proceedings contain 12 papers. the special focus in this conference is on Annual privacy Forum. the topics include: Preface;the GDPR and big data: Leading the way for big genetic data?;privacyScore: Improving priv...
来源: 评论
Semi-supervised knowledge transfer for deep learning from private training data  5
Semi-supervised knowledge transfer for deep learning from pr...
收藏 引用
5th International conference on Learning Representations, ICLR 2017
作者: Papernot, Nicolas Goodfellow, Ian Abadi, Martín Talwar, Kunal Erlingsson, Úlfar Pennsylvania State University United States Google Brain United States Google United States
Some machine learning applications involve training data that is sensitive, such as the medical histories of patients in a clinical trial. A model may inadvertently and implicitly store some of its training data;caref... 详细信息
来源: 评论
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark  29
Anonymity Services Tor, I2P, JonDonym: Classifying in the Da...
收藏 引用
29th Int Teletraffic Congress (ITC) / 1st International conference on Networking Science and Practice / 1st International Workshop on Softwarized Infrastructures for 5G and Fog Computing (Soft5) / PhD Workshop on Modelling Communication Networks
作者: Montieri, Antonio Ciuonzo, Domenico Aceto, Giuseppe Pescape, Antonio Univ Napoli Federico II Naples Italy NM2 Srl Naples Italy
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D).... 详细信息
来源: 评论
SECURESTREAMS: A reactive middleware framework for secure data stream processing  17
SECURESTREAMS: A reactive middleware framework for secure da...
收藏 引用
11th acm International conference on Distributed Event-Based Systems, DEBS 2017
作者: Havet, Aurélien Pires, Rafael Felber, Pascal Pasin, Marcelo Rouvoy, Romain Schiavoni, Valerio University of Neuchâtel Neuchâtel Switzerland Univ. Lille INRIA IUF Lille France
the growing adoption of distributed data processing frameworks in a wide diversity of application domains challenges end-to-end integration of properties like security, in particular when considering deployments in th... 详细信息
来源: 评论
SQLI Attacks: Current State and Mitigation in SDLC  5th
SQLI Attacks: Current State and Mitigation in SDLC
收藏 引用
5th International conference on Frontiers in Intelligent Computing - theory and applications (FICTA)
作者: Kaur, Daljit Kaur, Parminder Lyallpur Khalsa Coll Jalandhar India Guru Nanak Dev Univ Amritsar Punjab India
the SQL injection is a predominant type of attack and threat to web applications. this attack attempts to subvert the relationship between a webpage and its supporting database. Due to widespread availability of valua... 详细信息
来源: 评论
proceedings - 2017 IEEE 5th International conference on Future Internet of things and Cloud, FiCloud 2017
Proceedings - 2017 IEEE 5th International Conference on Futu...
收藏 引用
5th IEEE International conference on Future Internet of things and Cloud, FiCloud 2017
the proceedings contain 51 papers. the topics discussed include: a run time technique for handling error in user-estimated execution times on systems processing MapReduce jobs with deadlines;the effect of workload com...
来源: 评论
International conference on Computer Safety, Reliability, and security, SAFECOMP 2017 and 5th International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE 2017, 12th Workshop on Dependable Embedded and Cyber-physical Systems and Systems-of Systems, DECSoS 2017, 6th International Workshop on Next Generation of System Assurance Approaches for Safety Critical Systems, SASSUR 2017, 3rd International Workshop on Technical and Legal Aspects of data privacy and security, TELERISE 2017 and 2nd International Workshop on the Timing Performance in Safety Engineering, TIPS 2017
International Conference on Computer Safety, Reliability, an...
收藏 引用
International conference on Computer Safety, Reliability, and security, SAFECOMP 2017 and 5th International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE 2017, 12th Workshop on Dependable Embedded and Cyber-physical Systems and Systems-of Systems, DECSoS 2017, 6th International Workshop on Next Generation of System Assurance Approaches for Safety Critical Systems, SASSUR 2017, 3rd International Workshop on Technical and Legal Aspects of data privacy and security, TELERISE 2017 and 2nd International Workshop on the Timing Performance in Safety Engineering, TIPS 2017
the proceedings contain 39 papers. the special focus in this conference is on Computer Safety, Reliability, and security. the topics include: Making the case for safety of machine learning in highly automated driving;...
来源: 评论