咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1181-1190 订阅
排序:
Usability guidelines for developing mobile application in the construction industry  5
Usability guidelines for developing mobile application in th...
收藏 引用
5th International conference on Electrical Engineering and Informatics, ICEEI 2015
作者: Jailani, Norleyza Abdullah, Zuraidah Bakar, Marini Abu Haron, Harni Rohaida Software Technology and Management Research Centre Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Malaysia Construction IT Technology Development Sector Construction Industry Development Board Kuala Lumpur Malaysia
A key issue in the construction industry is that the atmosphere and working environment at construction sites are very different from the atmosphere in a typical office. the construction site workers are influenced by... 详细信息
来源: 评论
NFCGate: an NFC relay application for Android  15
NFCGate: an NFC relay application for Android
收藏 引用
proceedings of the 8th acm conference on security & privacy in Wireless and Mobile Networks
作者: Max Maass Uwe Müller Tom Schons Daniel Wegemer Matthias Schulz Technische Universität Darmstadt Darmstadt Germany
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in cl... 详细信息
来源: 评论
Collecting, Analyzing and Responding to Enterprise Scale DNS Events  15
Collecting, Analyzing and Responding to Enterprise Scale DNS...
收藏 引用
proceedings of the 5th acm conference on data and application security and privacy
作者: William Horne Hewlett-Packard Laboratories Princeton NJ USA
DNS is an important data source for security for many reasons. If the DNS infrastructure can be brought down, many networking tasks would be impossible to complete. If the integrity of the mapping between domain names... 详细信息
来源: 评论
Aligning security and Business Objectives for Process-Aware Information Systems  15
Aligning Security and Business Objectives for Process-Aware ...
收藏 引用
proceedings of the 5th acm conference on data and application security and privacy
作者: Günter Karjoth Lucerne University of Applied Sciences and Arts Lucerne Switzerland
Enterprises are increasingly subject to compliance rules that originate from corporate guidelines, industry sector standards, and laws. the goal of access control is to protect against unauthorized users. However, thr... 详细信息
来源: 评论
A hybrid approach for mobile security threat analysis  15
A hybrid approach for mobile security threat analysis
收藏 引用
proceedings of the 8th acm conference on security & privacy in Wireless and Mobile Networks
作者: Wanqing You Kai Qian Minzhe Guo Prabir Bhattacharya Ying Qian Lixin Tao Southern Polytechnic State University Marietta GA University of Cincinnati East China Normal University Shanghai China Pace University New York
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn... 详细信息
来源: 评论
On quantitative dynamic data flow tracking  14
On quantitative dynamic data flow tracking
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
作者: Lovat, Enrico Oudinet, Johan Pretschner, Alexander Technische Universität München Germany
We present a non-probabilistic model for dynamic quantitative data flow tracking. Estimations of the amount of data stored in a particular representation at runtime - a file, a window, a network packet - enable the ad... 详细信息
来源: 评论
Physical layer location privacy issue in wireless small cell networks  15
Physical layer location privacy issue in wireless small cell...
收藏 引用
proceedings of the 8th acm conference on security & privacy in Wireless and Mobile Networks
作者: Sadegh Farhang Yezekael Hayel Quanyan Zhu University of Avignon Avignon France University of Avignon Avignon France and New York University
High data rates are essential for next-generation wireless networks to support a growing number of computing devices and networking services. Small cell base station (SCBS) (e.g., picocells, microcells, femtocells) te...
来源: 评论
Minimizing lifetime of sensitive data in concurrent programs  14
Minimizing lifetime of sensitive data in concurrent programs
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
作者: Gondi, Kalpana Sistla, A. Prasad Venkatakrishnan, V.N. Department of Computer Science University of Illinois Chicago United States
the prolonged lifetime of sensitive data (such as passwords) in applications gives rise to several security risks. A promising approach is to erase sensitive data in an "eager fashion", i.e., as soon as its ... 详细信息
来源: 评论
Detecting man-in-the-middle attacks on non-mobile systems  14
Detecting man-in-the-middle attacks on non-mobile systems
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
作者: Vallivaara, Visa Sailio, Mirko Halunen, Kimmo VTT Technical Research Center of Finland Finland
In this paper we propose a method for detecting man-in-themiddle attacks using the timestamps of TCP packet headers. From these timestamps, the delays can be calculated and by comparing the mean of the delays in the c... 详细信息
来源: 评论
Cloud data security Access with privacy-Preserving  5
Cloud Data Security Access with Privacy-Preserving
收藏 引用
5th IEEE International conference on Software Engineering and Service Science (ICSESS)
作者: Wang, Jingyu Gu, Ruichun Univ Sci & Technol Beijing Sch Comp & Commun Engn Beijing 100083 Peoples R China Inner Mongolia Univ Sci & Technol Key Lab Integrated Exploitat Bayan Obo Multimet R Baotou Inner Mongolia Peoples R China
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. those advantages are the causes of security and privacy problems, which emerge because... 详细信息
来源: 评论