咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1261-1270 订阅
排序:
Efficient data gathering in intermittent connected mobile sensor networks
Efficient data gathering in intermittent connected mobile se...
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Xiong, Yongping Wu, Shizhong Zhang, Tao Deng, Yubo Chen, Shiwu China Information Technology Security Evaluation Center Beijing China
Intermittent Connected Mobile Sensor Networks (ICMSN) have emerged in recent studies, e.g. underwater sensor networks, wildlife tracking and human-oriented flu virus monitoring. In these networks, conventional routing... 详细信息
来源: 评论
application research of improved FUP algorithm in network security linkage system
Application research of improved FUP algorithm in network se...
收藏 引用
2013 5th International conference on Computational and Information Sciences, ICCIS 2013
作者: Cheng, Xiaorong Cao, Lipu School of Control and Computer Engineering North China Electric Power University Baoding China
Association rules are an important branch of data mining. Aiming at the update maintenance problem of association rules when increase the database data while keep the minimum support unchanged, on the basis of FUP alg... 详细信息
来源: 评论
5th International conference on Safety and security Engineering, SAFE 2013
收藏 引用
5th International conference on Safety and security Engineering, SAFE 2013
the proceedings contain 76 papers. the special focus in this conference is on Safety and security Engineering. the topics include: A tool for intelligent budget allocation of prevention measures related to major accid...
来源: 评论
Image processing based on statistical phase correlation algorithm
Image processing based on statistical phase correlation algo...
收藏 引用
2013 5th International conference on Computational and Information Sciences, ICCIS 2013
作者: Chen, Guangxuan Du, Yanhui Zhang, Lei Qin, Panke People's Public Security University of China Beijing China Academy of Logistics Beijing China Beijing University of Posts and Telecommunications Beijing China
the contribution of computer graphics in geophysics mainly embodies on the application of scientific computing visualization. In order to obtain the structural features and spatial distribution of various types of str... 详细信息
来源: 评论
privacy POLICY COMPOSITION OF privacy-AWARE RBAC MODEL FOR COMPOSITE WEB SERVICES
PRIVACY POLICY COMPOSITION OF PRIVACY-AWARE RBAC MODEL FOR C...
收藏 引用
2013 5th IEEE International conference on Broadband Network & Multimedia Technology
作者: Danfeng YAN Yuan TIAN Beijing University of Posts and Telecommunications
privacy has been acknowledged to be a critical requirement for composite services. In the previous research, we have introduced a privacy-preserving access model, but have no chance to detail the specifying of privacy... 详细信息
来源: 评论
privacy Control in Cloud VM File Systems
Privacy Control in Cloud VM File Systems
收藏 引用
IEEE International conference on Cloud Computing Technology and Science (CloudCom)
作者: Stéphane Betgé-Brezetz Guy-Bertrand Kamga Marie-Pascale Dupont Aoues Guesmi Alcatel-Lucent Bell Labs Nozay France
Cloud Computing offers great benefits such as reduced IT costs and an improved business agility. Nevertheless, enterprises are still hesitant to put their sensitive data in the cloud as they notably fear privacy issue... 详细信息
来源: 评论
Design of SMS commanded-and-controlled and P2P-structured mobile botnets  12
Design of SMS commanded-and-controlled and P2P-structured mo...
收藏 引用
5th acm conference on security and privacy in Wireless and Mobile Networks, WiSec'12
作者: Zeng, Yuanyuan Shin, Kang G. Hu, Xin Perimeter E-Security Raleigh NC United States University of Michigan Ann Arbor MI United States IBM Research Hawthorne NY United States
Botnets are one of the most serious security threats to the Internet and personal computer (PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with the rapidly-growing popularity of s... 详细信息
来源: 评论
Private communication detection: A stochastic approach  12
Private communication detection: A stochastic approach
收藏 引用
5th acm conference on security and privacy in Wireless and Mobile Networks, WiSec'12
作者: Jong, Chang-Han Gligor, Virgil D. ECE Department University of Maryland College Park MD 20742 United States ECE Department and CyLab Carnegie Mellon University Pittsburgh PA 15213 United States
Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Ordinary users have ne... 详细信息
来源: 评论
Unsafe exposure analysis of mobile in-app advertisements  12
Unsafe exposure analysis of mobile in-app advertisements
收藏 引用
5th acm conference on security and privacy in Wireless and Mobile Networks, WiSec'12
作者: Grace, Michael Zhou, Wu Jiang, Xuxian Sadeghi, Ahmad-Reza Department of Computer Science North Carolina State University Raleigh NC United States Center for Advanced Security Research Technical University Darmstadt Darmstadt Germany
In recent years, there has been explosive growth in smartphone sales, which is accompanied with the availability of a huge number of smartphone applications (or simply apps). End users or consumers are attracted by th... 详细信息
来源: 评论
Frequent itemsets mining in network traffic data
Frequent itemsets mining in network traffic data
收藏 引用
2012 5th International conference on Intelligent Computation Technology and Automation, ICICTA 2012
作者: Li, Xin Zheng, Xuefeng Li, Jingchun Wang, Shaojie School of Information Engineering University of Science and Technology Beijing China National Research Center for Information Technology Security Beijing China
Many projects have tried to analyze the structure and dynamics of application overlay networks on the Internet using packet analysis and network flow data. While such analysis is essential for a variety of network man... 详细信息
来源: 评论