咨询与建议

限定检索结果

文献类型

  • 1,499 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,160 篇 工学
    • 1,085 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 323 篇 信息与通信工程
    • 143 篇 电气工程
    • 128 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 47 篇 网络空间安全
    • 45 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 生物医学工程(可授...
    • 36 篇 生物工程
    • 34 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 26 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 242 篇 理学
    • 170 篇 数学
    • 42 篇 生物学
    • 30 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 226 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 64 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 16 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 25 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,251 篇 英文
  • 278 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1531 条 记 录,以下是1061-1070 订阅
排序:
CODASPY 2014 - proceedings of the 4th acm conference on data and application security and privacy
CODASPY 2014 - Proceedings of the 4th ACM Conference on Data...
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
the proceedings contain 41 papers. the topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for str...
来源: 评论
SafeFS: A Modular Architecture for Secure User-Space File Systems (One FUSE to rule them all)  10
SafeFS: A Modular Architecture for Secure User-Space File Sy...
收藏 引用
10th acm International Systems and Storage conference (Systor)
作者: Pontes, Rogerio Burihabwa, Dorian Maia, Francisco Paulo, Joao Schiavoni, Valerio Felber, Pascal Mercier, Hugues Oliveira, Rui Univ Neuchatel Neuchatel Switzerland INESC TEC Porto Portugal Univ Minho Braga Portugal
the exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. this migration occurri... 详细信息
来源: 评论
CrowdMask: Using Crowds to Preserve privacy in Crowd-Powered Systems via Progressive Filtering  5
CrowdMask: Using Crowds to Preserve Privacy in Crowd-Powered...
收藏 引用
5th AAAI conference on Human Computation and Crowdsourcing, HCOMP 2017
作者: Kaur, Harmanpreet Gordon, Mitchell Yang, Yiwei Bigham, Jeffrey P. Teevan, Jaime Kamar, Ece Lasecki, Walter S. University of Michigan Ann ArborMI United States University of Rochester RochesterNY United States Microsoft Research RedmondWA United States Carnegie Mellon University PittsburghPA United States
Crowd-powered systems leverage human intelligence to go beyond the capabilities of automated systems, but also introduce privacy and security concerns because unknown people must view the data that the system processe... 详细信息
来源: 评论
Attack modeling for system security analysis: (position paper)
Attack modeling for system security analysis: (position pape...
收藏 引用
International conference on Computer Safety, Reliability, and security, SAFECOMP 2017 and 5th International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE 2017, 12th Workshop on Dependable Embedded and Cyber-physical Systems and Systems-of Systems, DECSoS 2017, 6th International Workshop on Next Generation of System Assurance Approaches for Safety Critical Systems, SASSUR 2017, 3rd International Workshop on Technical and Legal Aspects of data privacy and security, TELERISE 2017 and 2nd International Workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Altawairqi, Abdullah Maarek, Manuel Heriot-Watt University Edinburgh United Kingdom
Approaches to the safety analysis of software-intensive systems are being adapted to also provide security assurance. Extensions have been proposed to reflect the specific nature of security analysis by introducing in... 详细信息
来源: 评论
Mobile application of Video Watermarking Using Discrete Cosine Transform on Android Platform  5
Mobile Application of Video Watermarking Using Discrete Cosi...
收藏 引用
5th International conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME)
作者: Busiri, Moch Ginanjar Munir, Rinaldi Inst Teknol Bandung Sch Elect Engn & Informat Bandung Indonesia
Digital watermarking is a way to keep the security of digital data such as videos and images. Steganography is a method to hide message or watermark into data in order to keep it secret and avoid attention from others... 详细信息
来源: 评论
Software updates in safety and security co-engineering
Software updates in safety and security co-engineering
收藏 引用
International conference on Computer Safety, Reliability, and security, SAFECOMP 2017 and 5th International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE 2017, 12th Workshop on Dependable Embedded and Cyber-physical Systems and Systems-of Systems, DECSoS 2017, 6th International Workshop on Next Generation of System Assurance Approaches for Safety Critical Systems, SASSUR 2017, 3rd International Workshop on Technical and Legal Aspects of data privacy and security, TELERISE 2017 and 2nd International Workshop on the Timing Performance in Safety Engineering, TIPS 2017
作者: Mugarza, Imanol Parra, Jorge Jacob, Eduardo IK4-Ikerlan Technology Research Centre Dependable Embedded Systems Area Po J.M. Arizmendiarrieta 2 Arrasate-Mondragón20500 Spain Faculty of Enginnering University of the Basque Country UPV/EHU Alameda Urquijo s/n Bilbao48013 Spain
the application of Industry 4.0 in automation systems leads to a higher interconnectivity among machines, devices, sensors, the cloud and humans. Nevertheless, this paradigm leaves open the possibility of new cyber-se... 详细信息
来源: 评论
A study on security risk in cloud computing  5
A study on security risk in cloud computing
收藏 引用
5th International conference on Information Science and Cloud Computing, ISCC 2017
作者: Chen, Lijun Chen, Xiaoru Institute of software ecology and artificial intelligence South China Institute of Software Engineering of Guang Zhou university Guangzhou510990 China
With the rapid development of the global economy and internet technology, cloud computing technology has been advanced at a rapid pace. Cloud computing technology is a new development model for large-scale computing a... 详细信息
来源: 评论
21st International Workshops on Financial Cryptography and data security, FC 2017 held in conjuction with 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, 2nd Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2017, 1st Workshop on Trusted Smart Contracts, WTSC 2017 and 1st Workshop on Targeted Attacks, TA 2017
收藏 引用
21st International Workshops on Financial Cryptography and data security, FC 2017 held in conjuction with 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, 2nd Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2017, 1st Workshop on Trusted Smart Contracts, WTSC 2017 and 1st Workshop on Targeted Attacks, TA 2017
the proceedings contain 39 papers. the special focus in this conference is on Financial Cryptography and data security. the topics include: Preface: Bitcoin 2017: 4th workshop on bitcoin and blockchain research;Prefac...
来源: 评论
Monitoring Container Services at the Network Edge  29
Monitoring Container Services at the Network Edge
收藏 引用
29th Int Teletraffic Congress (ITC) / 1st International conference on Networking Science and Practice / 1st International Workshop on Softwarized Infrastructures for 5G and Fog Computing (Soft5) / PhD Workshop on Modelling Communication Networks
作者: Grossmann, Marcel Klug, Clemens Univ Bamberg Comp Networks Grp Bamberg Germany
Recent developments induced by the Internet of things (IoT) force a paradigm shift to deploy on demand services to a broad range of different computing architectures. Mainly single board computers (SBCs) gained a lot ... 详细信息
来源: 评论
5th International conference on Frontiers in Intelligent Computing: theory and applications, FICTA 2016
5th International Conference on Frontiers in Intelligent Com...
收藏 引用
5th International conference on Frontiers in Intelligent Computing theory and applications, FICTA 2016
the proceedings contain 71 papers. the special focus in this conference is on Frontiers in Intelligent Computing: theory and applications. the topics include: Information retrieval for Gujarati language using cosine s...
来源: 评论