咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是151-160 订阅
排序:
TreeChain: A High throughput and Efficient Search based Secure application for Internet of Vehicles  23
TreeChain: A High Throughput and Efficient Search based Secu...
收藏 引用
24th International conference on Distributed Computing and Networking (ICDCN)
作者: Kumar, Amritesh Das, Debasis IIT Jodhpur Rajasthan India
the Internet of Vehicles (IoV) rapidly expands due to lower bandwidth, enhanced security, and privacy for high-quality information sharing with minimal latency. To properly execute all these services, IoV must first o... 详细信息
来源: 评论
Investigation of the Internet of things (IoT) security and privacy Issues  5
Investigation of the Internet of Things (IoT) Security and P...
收藏 引用
5th International conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Gautam, Krishan Kant Singh Kumar, Rajendra Yadav, Rakesh Sharma, Preeti Jamia Millia Islamia Central University Department of Computer Science New Delhi110025 India Shivaji College University of Delhi Department of Computer Science New Delhi110027 India
Connecting diverse devices and facilitating unhindered connection and data exchange, the IoT has dramatically altered the ways in which humans engage with their surroundings. However, there are major privacy and safet... 详细信息
来源: 评论
Federated Learning for Predictive Maintenance: Model Comparisons and privacy Advantages  5
Federated Learning for Predictive Maintenance: Model Compari...
收藏 引用
5th International conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Singh, Ashita Sampath, Raghav Raj, Shiv Akash Dhinakar Mary, Gerardine Immaculate Aarthi, G. Rajesh Kumar, M. School of Electronics Engineering Vellore Institute of Technology Vellore India
Predictive maintenance has evolved into an essential component of modern industrial systems, enabling early detection of equipment defects and reducing downtime. Traditional methodologies have frequently relied on cen... 详细信息
来源: 评论
Local Methods for privacy Protection and Impact on Fairness  23
Local Methods for Privacy Protection and Impact on Fairness
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Palamidessi, Catuscia Inria Saclay Palaiseau France Inst Polytech Paris Palaiseau France
the increasingly pervasive use of big data and machine learning is raising various ethical issues, in particular privacy and fairness. In this talk, I will discuss some frameworks to understand and mitigate the issues... 详细信息
来源: 评论
5th International conference on security and privacy in New Computing Environments, SPNCE 2022
5th International Conference on Security and Privacy in New ...
收藏 引用
5th International conference on security and privacy in New Computing Environments, SPNCE 2022
the proceedings contain 12 papers. the special focus in this conference is on security and privacy in New Computing Environments. the topics include: P-TECS: An Energy Balance Algorithm for Opportunistic Networks...
来源: 评论
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential privacy with Optimal Gaussian Noise and application to Deep Learning  23
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping ...
收藏 引用
30th acm SIGSAC conference on Computer and Communications security (acm CCS)
作者: Xiao, Hanshen Wan, Jun Devadas, Srinivas MIT Cambridge MA 02139 USA
We study the fundamental problem of the construction of optimal randomization in Differential privacy (DP). Depending on the clipping strategy or additional properties of the processing function, the corresponding sen... 详细信息
来源: 评论
Edge-Based security Measures for a Robust Internet of things Ecosystem  5
Edge-Based Security Measures for a Robust Internet of Things...
收藏 引用
5th International conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Niranjana, R. Ravi, A. Arvind, S. Vignesh, M. Vishaal, S. Sri Krishna College of Engineering and Technology Department of Ece Coimbatore India Francis Xavier Engineering College Department of Eee Tirunelveli India
Amidst the fourth technological revolution, characterized by the expanding reach of the internet and its applications, smart devices gain increasing acceptance. A proposition is presented for remotely managing househo... 详细信息
来源: 评论
Comparative Analysis of Blowfish and Twofish Cryptographic Protocol  5
Comparative Analysis of Blowfish and Twofish Cryptographic P...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Rawat, Bhupender Singh Singh, Anushree Sharma, Hemendra Shankar Saxena, Megha Verma, Pooja College of Smart Computing COER University Roorkee India Invertis University Department of Computer Applications Bareilly India Uttaranchal Institute of Technology Uttaranchal University Uttarakhand Dehradun248007 India
In today's interconnected world showcasing technical advancement, the exchange of information is conducted through the network as a communication medium at the click of a button. Still, the problem is that the med... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for Cybersecurity & Network security  5
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
5th International conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Shaw, Ranju Parveen, Suraiya Jamia Hamdard University Dept. of Computer Science Engineering with Specialization in Cyber Forensic Information Security Delhi India Faculty at Jamia Hamdard University Sest Department of Computer Science Engineering Delhi India
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t... 详细信息
来源: 评论
Real-Time Adaptive Intrusion Detection System [RTPIDS] for Internet of things Using Federated Learning and Blockchain  5
Real-Time Adaptive Intrusion Detection System [RTPIDS] for I...
收藏 引用
5th International conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Sunil Raj, Y. Parimala, E. Helen Bosco, V. S. Jayakumar Paul Adarsh Samuel Raj, J. Kumar, P.J. Rosario Vasantha Kolluru, Vinothkumar Department of Data Science Palayamkottai627 002 India Gitam Deemed to be University Department of Computer Science Bangalore India Department of Bca Tirupattur635601 India San Jose State University San JoseCA United States Palayamkottai627002 India Stevens Institute of Technology Department of Data Science 1 Castle Point Terrace HobokenNJ07030 United States
In the growing field of the Internet of things (IoT), ensuring security and privacy has become a critical concern, particularly in sensitive domains such as healthcare. this paper presents a Real-Time Adaptive Intrusi... 详细信息
来源: 评论