咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1171-1180 订阅
排序:
Towards self-protective multi-cloud applications: MUSA-A holistic framework to support the security-intelligent lifecycle management of multi-cloud applications  5
Towards self-protective multi-cloud applications: MUSA-A hol...
收藏 引用
5th International conference on Cloud Computing and Services Science, CLOSER 2015
作者: Rios, Erkuden Iturbe, Eider Orue-Echevarria, Leire Rak, Massimiliano Casola, Valentina TECNALIA ICT-European Software Institute Parque Tecnológico de Bizkaia C/ Geldo Edificio 700 DerioE-48160 Spain Italy Dipartimento di Ingegneria Elettrica e Delle Tecnologie dell'Informazione Da Università di Napoli via Claudio Napoli Italy
the most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. they have to deal with t... 详细信息
来源: 评论
Study And Research of APT Detection Technology Based on Big data Processing Architecture
Study And Research of APT Detection Technology Based on Big ...
收藏 引用
2015 5th International conference on Electronics Information and Emergency Communication (ICEIEC)
作者: Lin Shenwen Li Yingbo Du Xiongjie Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Beijing Peoples R China
this paper researches and designs a APT detection system based on big data processing architecture, which includes data capturing, big data processing, APT Analyzing and application layer. the system can detect both k... 详细信息
来源: 评论
5th International conference on Innovative Computing Technology, INTECH 2015
5th International Conference on Innovative Computing Technol...
收藏 引用
5th International conference on Innovative Computing Technology, INTECH 2015
the proceedings contain 28 papers. the topics discussed include: hospital dietary planning system using constraint programming;toward a student information system for Sebha university, Libya;distribution based ensembl... 详细信息
来源: 评论
Assistant analyzer for the characteristics of electricity behavior based on big data technology  5
Assistant analyzer for the characteristics of electricity be...
收藏 引用
5th IEEE International conference on Electric Utility Deregulation, Restructuring and Power Technologies, DRPT 2015
作者: Zhu, Dong Gao, Ciwei Lu, Tingting Liu, Fuchao Han, Yongjun Zhang, Jianhua Jiangsu Provincial Key Laboratory of Smart Grid Technology and Equipment Southeast University Nanjing China Southeast University Chengxian College Nanjing China Electrical Power Research Institute State Grid Gansu Power Company Lanzhou China
With the development of science and technology, the security of power system is facing great challenge, and it is necessary to implement the analysis of electricity behavior characteristics based on big data technolog... 详细信息
来源: 评论
Social Personal data Stores: the Nuclei of Decentralised Social Machines  24
Social Personal Data Stores: the Nuclei of Decentralised Soc...
收藏 引用
24th International conference on World Wide Web (WWW)
作者: Van Kleek, Max Smith, Daniel A. Murray-Rust, Dave Guy, Amy O'Hara, Kieron Dragan, Laura Shadbolt, Nigel R. Univ Southampton Web & Internet Sci Southampton SO9 5NH Hants England Univ Edinburgh Sch Informat Edinburgh EH8 9YL Midlothian Scotland
Personal data Stores are among the many efforts that are currently underway to try to re-decentralise the Web, and to bring more control and data management and storage capability under the control of the user. Few of... 详细信息
来源: 评论
WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel based on Memory Deduplication  5
WindTalker: An Efficient and Robust Protocol of Cloud Covert...
收藏 引用
IEEE 5th International conference on Big data and Cloud Computing (BDCloud)
作者: Rong, Hong Wang, Huimei Liu, Jian Zhang, Xiaochen Xian, Ming Natl Univ Def Technol State Key Lab Complex Electromagnet Environm Effe Changsha Hunan Peoples R China
As information security and privacy are primary concerns for most enterprises and individuals, a threat called Cross-VM (Virtual Machine) Attack certainly impedes their adoption of public or hybrid cloud computing. Sp... 详细信息
来源: 评论
5th conference on Global Innovation and Knowledge Academy, GIKA 2015
5th Conference on Global Innovation and Knowledge Academy, G...
收藏 引用
5th Global Innovation and Knowledge Academy conference, GIKA 2015
the proceedings contain 13 papers. the special focus in this conference is on Global Innovation and Knowledge Academy. the topics include: Contribution of computing services to benchmarking asset management knowledge ...
来源: 评论
Cloud spreadsheets supporting data processing in the encrypted domain  5
Cloud spreadsheets supporting data processing in the encrypt...
收藏 引用
5th International conference on Cloud Computing and Services Science, CLOSER 2015
作者: Rodríguez-Silva, D.A. Adkinson-Orellana, L. Pedrero-López, B. González-Castaño, F.J. Gradiant Edif. CITEXVI Campus de Vigo Pontevedra36310 Spain AtlantTIC Escuela de Ingeniería de Telecomunicación Universidade de Vigo Pontevedra36310 Spain
security has become one of the main barriers for the adoption of cloud services. A range of legal initiatives that require support mechanisms such as access control and data encryption have been proposed to ensure pri... 详细信息
来源: 评论
POSTER: bitheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android application  15
POSTER: biTheft: Stealing Your Secrets by Bidirectional Cove...
收藏 引用
22nd acm SIGSAC conference on Computer and Communications security (CCS)
作者: Wu, Jingzheng Wu, Yanjun Yang, Mutian Wu, Zhifei Luo, Tianyue Wang, Yongji Chinese Acad Sci Gen Dept State Key Lab Comp Sci Inst Software Beijing Peoples R China Chinese Acad Sci Gen Dept Inst Software Beijing Peoples R China Inst Software State Key Lab Comp Sci NFS Beijing Peoples R China
Android has 81.5% of the smartphone market now, and it is also suffering from the explosive growth of malicious applications (or apps). these apps steal users' secret data and transmit it out of the phones. By ana... 详细信息
来源: 评论
A privacy Enhanced security Framework for Android Users
A Privacy Enhanced Security Framework for Android Users
收藏 引用
International conference on IT Convergence and security (ICITCS)
作者: Shirish Kumar Singh Bharavi Mishra Poonam Gera Computer Science and Engineering Dept. The LNM-Institute of Information Technology Jaipur India
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of user'... 详细信息
来源: 评论