咨询与建议

限定检索结果

文献类型

  • 1,499 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,160 篇 工学
    • 1,085 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 323 篇 信息与通信工程
    • 143 篇 电气工程
    • 128 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 47 篇 网络空间安全
    • 45 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 生物医学工程(可授...
    • 36 篇 生物工程
    • 34 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 26 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 242 篇 理学
    • 170 篇 数学
    • 42 篇 生物学
    • 30 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 226 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 64 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 16 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 25 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,251 篇 英文
  • 278 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1531 条 记 录,以下是1081-1090 订阅
排序:
An Open and Portable Platform for Learning data security in Mobile Cloud Computing  16
An Open and Portable Platform for Learning Data Security in ...
收藏 引用
17th Annual conference on Information Technology Education (SIGITE) and 5th Annual conference on Research in Information Technology (RIIT)
作者: Li, Lei Qian, Kai Hasan, Ragid Chen, Qian Wu, Dalei Shi, Yong Kennesaw State Univ 1100 South Marietta Pkwy Marietta GA 30060 USA Univ Alabama Birmingham 300 Univ Blvd Birmingham AL 35294 USA Savannah State Univ 3219 Coll St Savannah GA 31404 USA Univ Tennessee 615 McCallie Ave Chattanooga TN 37403 USA Kennesaw State Univ 1100 South Marietta Pkwy Mairetta GA 30060 USA
Mobile cloud computing (MCC) has become an emerging technology given the explosive growth of mobile devices and advances in cloud computing in recent years. data security and privacy are the main issues preventing ind... 详细信息
来源: 评论
privacy-Preserving Mining of Sequential Association Rules from Provenance Workflows  16
Privacy-Preserving Mining of Sequential Association Rules fr...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Maruseac, Mihai Ghinita, Gabriel UMass Boston Boston MA 02125 USA
Provenance workflows capture movement and transformation of data in complex environments, such as document management in large organizations, content generation and sharing in in social media, scientific computations,... 详细信息
来源: 评论
PANDDE: Provenance-based ANomaly Detection of data Exfiltration  16
PANDDE: Provenance-based ANomaly Detection of Data Exfiltrat...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Fadolalkarim, Daren Sallam, Asmaa Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47906 USA Purdue Univ Cyber Ctr W Lafayette IN 47906 USA
Preventing data exfiltration by insiders is a challenging process since insiders are users that have access permissions to the data. Existing mechanisms focus on tracking users' activities while they are connected... 详细信息
来源: 评论
On Energy security of Smartphones  16
On Energy Security of Smartphones
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Gao, Xing Liu, Dachuan Liu, Daiping Wang, Haining Univ Delaware Newark DE 19716 USA Coll William & Mary Williamsburg VA USA
the availability of smartphones is still severely restricted by the limited battery lifetime. To help users understand the energy consumption, major mobile platforms support fine-grained energy profiling for each app.... 详细信息
来源: 评论
the Paradox of Social Media security: Users' Perceptions versus Behaviors  5
The Paradox of Social Media Security: Users' Perceptions ver...
收藏 引用
5th Annual conference on Research in Information Technology, RIIT 2016
作者: Alqubaiti, Zahra Li, Lei He, Jing Kennesaw State University 1100 South Marietta Pkwy GA30060 United States
Social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and mad... 详细信息
来源: 评论
A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing
A Framework and the Design of Secure Mobile Cloud with Smart...
收藏 引用
International conference on Mobile Cloud Computing, Services, and Engineering
作者: Isaac J. Cushman Md. Baitul A1 Sadi Lei Chen Rami J. Haddad Georgia Southern University Statesboro USA Georgia Southern University Statesboro GA US
the use of mobile devices has exponentially expanded in recent years. A device which was made with the sole purpose of making mobile audio phone calls is now the leading basis for functionality in the social world. th... 详细信息
来源: 评论
JSLINQ: Building Secure applications across Tiers  16
JSLINQ: Building Secure Applications across Tiers
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Balliu, Musard Liebe, Benjamin Schoepe, Daniel Sabelfeld, Andrei Chalmers Gothenburg Sweden
Modern web and mobile applications are complex entities amalgamating different languages, components, and platforms. the rich features span the application tiers and components, some from third parties, and require su... 详细信息
来源: 评论
Differentially Private K-Means Clustering  16
Differentially Private K-Means Clustering
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Su, Dong Cao, Jianneng Li, Ninghui Bertino, Elisa Jin, Hongxia Purdue Univ W Lafayette IN 47907 USA Inst Infocomm Res Singapore Singapore Samsung Res Amer Mountain View CA USA
there are two broad approaches for differentially private data analysis. the interactive approach aims at developing customized differentially private algorithms for various data mining tasks. the non-interactive appr... 详细信息
来源: 评论
Hacking the DBMS to Prevent Injection Attacks  16
Hacking the DBMS to Prevent Injection Attacks
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Medeiros, Iberia Beatriz, Miguel Neves, Nuno Correia, Miguel Univ Lisbon Fac Ciencias INESC ID Lisbon Portugal Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal Univ Lisbon Fac Ciencias LaSIGE Lisbon Portugal
After more than a decade of research, web application security continues to be a challenge and the backend database the most appetizing target. the paper proposes preventing injection attacks against the database mana... 详细信息
来源: 评论
Big data Emerging Issues: Hadoop security and privacy  5
Big Data Emerging Issues: Hadoop Security and Privacy
收藏 引用
5th International conference on Multimedia Computing and Systems (ICMCS)
作者: Abouelmehdi, Karim Beni-Hssane, Abderrahim Khaloufi, Hayat Saadi, Mostafa Chouaib Doukali Univ Lab LAMAPI & LAROSERI Dept Comp Sci El Jadida Morocco Chouaib Doukkali Univ Fac Sci Dept Comp Sci LAROSERI Lab El Jadida Morocco Univ Hassan 1er Settat Ecole Natl Sci Appl ENSA Khouribga Dept Informat & Telecoms Settat Morocco
With the growing development of data, it has become increasingly vulnerable and exposed to malicious attacks. these attacks can damage the essential properties such as confidentiality, integrity and availability of in... 详细信息
来源: 评论