咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是171-180 订阅
排序:
Decentralized security in IoT: Lightweight Blockchain with Optimized CA-LSTM for Improved Performance and privacy  5
Decentralized Security in IoT: Lightweight Blockchain with O...
收藏 引用
5th International conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Selvakumarasamy, K. Kumar, T. Rajesh Meenambika, A. Balamanigandan, R. Mahaveerakannan, R. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Electronics and Communication Engineering Chennai602105 India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai602105 India Psna College of Engineering and Technology Computer Science and Business Systems India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
An existing infrastructure can be linked to billions of devices, or "things,"through the Internet of things (IoT). this allows for machine-to-machine communication as well as human-to-human communication. Ma... 详细信息
来源: 评论
privacy-preserving smart grid fault diagnosis method based on federated conditional model strategy  5
Privacy-preserving smart grid fault diagnosis method based o...
收藏 引用
5th International conference on Signal Processing and Computer Science, SPCS 2024
作者: Xu, Aidong Du, Jinran Dai, Tao Xu, Peiming Wang, Zhuowei Chen, Chong Mao, Dong Electric Power Research Institute CSG Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China School of Computers Guangdong University of Technology Guangzhou China
In this study, a method based on Differential privacy Federated Learning (DPFL) is adopted, which is suitable for safe and efficient processing of power grid data. Combined with a new algorithm called DP-FedSAM, which... 详细信息
来源: 评论
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks  23
BigMac: Performance Overhead of User Plane Integrity Protect...
收藏 引用
16th acm conference on security and privacy in Wireless and Mobile Networks, WiSec 2023
作者: Heijligenberg, thijs Knips, Guido Böhm, Christian Rupprecht, David Kohls, Katharina Radboud University Nijmegen Netherlands Ruhr University Bochum Germany Radix Security Bochum Germany
5G introduces a series of new security features that overcome known issues of the previous mobile generations. One of these features is integrity protection for user plane data. While this addition protects against ma... 详细信息
来源: 评论
Robust Ad-hoc security Measures In Cloud Computing  5
Robust Ad-hoc Security Measures In Cloud Computing
收藏 引用
5th IEEE International conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Vashisht, Vijay Laxmi Gupta, Bhavya Yadav, Sudeept Singh Galgotias University Greater Noida India
Due to the integration of cloud computing with ad hoc networks and the growing use of wireless networks, ad hoc security in cloud computing has emerged as a critical issue. Specially appointed networks are remote orga... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. this study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
5th International conference on Innovative data Communication Technologies and application, ICIDCA 2024
5th International Conference on Innovative Data Communicatio...
收藏 引用
5th International conference on Innovative data Communication Technologies and application, ICIDCA 2024
the proceedings contain 103 papers. the topics discussed include: secure goods storage and anti-theft approach using Ethereum blockchain;an enhanced dynamic multi-path routing algorithm for software defined networks;i...
来源: 评论
Comparative Study of security threats in Cloud Computing  5
Comparative Study of Security Threats in Cloud Computing
收藏 引用
5th IEEE International conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Garg, Tisha Shalu Saini, Neha Singh, Manjeet Manav Rachna University Department Of Computer Science & Technology Faridabad India Manav Rachna University Haryana Faridabad India Government College Chhachhrauli Hry Yamuna Nagar India Govt. College Bhainswal Kalan Haryana Sonipat India
Cloud computing (CC) offers on-requirement access of the resources to perform cloud related activities and generates bill as per the use by customer. It minimizes both the cost and the complexity for service suppliers... 详细信息
来源: 评论
An Enhanced Multi-Key Asymmetric Cryptosystem for Strengthened data security  5
An Enhanced Multi-Key Asymmetric Cryptosystem for Strengthen...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Yuvarani, R. Mahaveerakannan, R. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamilnadu Chennai602105 India
the rapid growth of network technology has led to increased exposure to security vulnerabilities due to more systems being connected globally. Securing end-to-end connections is essential to guaranteeing data integrit... 详细信息
来源: 评论
Assessment of Conflict Structure Recognition and Bias Impact in Japanese LLMs  5
Assessment of Conflict Structure Recognition and Bias Impact...
收藏 引用
5th Technology Innovation Management and Engineering Science International conference, TIMES-iCON 2024
作者: Inoshita, Keito Faculty of Data Science Shiga University Hikone Japan
—In recent years, with the evolution and proliferation of large language models (LLMs), their application in various fields, including security, has been expanding. LLMs, which learn from vast amounts of text data an... 详细信息
来源: 评论
Advancing Healthcare in Cordoba :Telemedicine as a Service (PGaaS) and Addressing OWASP Machine Learning security Challenges  50
Advancing Healthcare in Cordoba :Telemedicine as a Service (...
收藏 引用
50th Latin American Computing conference (CLEI)
作者: Julio, Yair Rivera Mangones, Angel Pinto Tovio, Juan Torres Hernandez, Frank Ibarra Aguilar, Jose Gomez, Sirley Kerguelen Inst Univ Amer Dept Ingn Sistemas Barranquilla Colombia Univ Sinu Dept Ingn Sistemas Monteria Colombia Univ Sinu Dept Ingn Elect Monteria Colombia IMDEA Networks Inst Madrid Spain Univ Los Andes CEMISID Merida Venezuela Corp Unificada Nacl Dept Ingn Sistemas Monteria Colombia
this study proposes a framework that leverages ML algorithms for the cybersecurity of telemedicine systems in the Department of Cordoba, Colombia, addressing challenges amplified by the COVID-19 pandemic. the framewor... 详细信息
来源: 评论