咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是221-230 订阅
排序:
SecureChainAI: Integrating Blockchain and Artificial Intelligence for Enhanced security in IoT Environments  5
SecureChainAI: Integrating Blockchain and Artificial Intelli...
收藏 引用
5th International conference on Smart Electronics and Communication, ICOSEC 2024
作者: thamaraiselvi, K. Pushpalatha, A. Chidambarathanu, K. Wankhede, Jaishri P. Alagumuthukrishnan, S. Sarveshwaran, Velliangiri New Horizon College of Engineering Department of Information Science and Engineering Bangalore India Karpagam College of Engineering Department of Computer Science and Design Coimbatore India R.M.K. Engineering College Department of Computer Science and Business Systems Kavaraipettai India Cmr Institute of Technology Department of Computer Science and Engineering Hyderabad India Srm Institute of Science and Technology Department of Computational Intelligence Kattankulathur India
Internet of things (IoT) systems develop with paramount importance for security in view of the increased deployment of IoT devices over critical sectors like healthcare, industry automation, and smart cities. the risk... 详细信息
来源: 评论
Distributed Artificial Intelligence application in Agri-food Supply Chains 4.0  5
Distributed Artificial Intelligence Application in Agri-food...
收藏 引用
5th International conference on Industry 4.0 and Smart Manufacturing (ISM)
作者: Sharifmousavi, Mahdi Kayvanfar, Vahid Baldacci, Roberto Univ Tehran Dept Governance Tehran *** Iran Qatar Fdn Hamad Bin Khalifa Univ Div Engn Management & Decis Sci Coll Sci & Engn Doha 34110 Qatar
Supply Chain 4.0 is characterized by various factors, including seamless integration and connectivity, the Internet of things (IoT), Big data, AI participation, Cyber-Physical Systems (CPSs), flexibility, adaptability... 详细信息
来源: 评论
Network security and Cryptography: A Qualitative Exploration and Recent Advancements  5
Network Security and Cryptography: A Qualitative Exploration...
收藏 引用
5th IEEE International conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Ekta Singh, Ajit Bhagat Phool Singh Mahila Vishwavidyalaya India Bhagat Phool Singh Mahila Vishwavidyalaya Dept. Of Cse India
Network security and cryptography as a concept deal with network and data protection. data security involves transmission of data securely even over an unreliable network whereas network security involves hardening of... 详细信息
来源: 评论
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
5th EAI International Conference on Multimedia Technology an...
收藏 引用
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
the proceedings contain 121 papers. the special focus in this conference is on Multimedia Technology and Enhanced Learning. the topics include: security Awareness Method of Opportunistic Network Routing Protocol Based...
来源: 评论
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
5th EAI International Conference on Multimedia Technology an...
收藏 引用
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
the proceedings contain 121 papers. the special focus in this conference is on Multimedia Technology and Enhanced Learning. the topics include: security Awareness Method of Opportunistic Network Routing Protocol Based...
来源: 评论
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
5th EAI International Conference on Multimedia Technology an...
收藏 引用
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
the proceedings contain 121 papers. the special focus in this conference is on Multimedia Technology and Enhanced Learning. the topics include: security Awareness Method of Opportunistic Network Routing Protocol Based...
来源: 评论
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
5th EAI International Conference on Multimedia Technology an...
收藏 引用
5th EAI International conference on Multimedia Technology and Enhanced Learning, ICMTEL 2023
the proceedings contain 121 papers. the special focus in this conference is on Multimedia Technology and Enhanced Learning. the topics include: security Awareness Method of Opportunistic Network Routing Protocol Based...
来源: 评论
Mobile application for Visualizing the Measurements  5
Mobile Application for Visualizing the Measurements
收藏 引用
5th IEEE International conference on Modern Electrical and Energy System, MEES 2023
作者: Kiresova, Simona Guzan, Milan Sobota, Branislav Melnykov, Viacheslav Yatsiuk, Rostyslav Peryvertailo, Bohdan Technical University of Košice Dept. of Theoretical and Industrial Electrical Engineering Košice Slovakia Technical University of Košice Dept. of Computers and Informatics Košice Slovakia Kremenchuk Mykhailo Ostrohradskyi National University Dept. of Systems of Automatic Control and Electric Drive Kremenchuk Ukraine National University Dept. of Computer Engineering and Electronics Kremenchuk Mykhailo Ostrohradskyi Kremenchuk Ukraine
this paper deals with the design of an Android mobile application and visualization of the measured values of particulate matter and meteorological factors from the measurement stations. the application can in princip... 详细信息
来源: 评论
5th International conference on HCI for Cybersecurity, privacy and Trust, HCI-CPT 2023, held as part of the 25th International conference on Human-Computer Interaction, HCII 2023
5th International Conference on HCI for Cybersecurity, Priva...
收藏 引用
5th International conference on HCI for Cybersecurity, privacy and Trust, HCI-CPT 2023, held as part of the 25th International conference on Human-Computer Interaction, HCII 2023
the proceedings contain 44 papers. the special focus in this conference is on HCI for Cybersecurity, privacy and Trust. the topics include: Usable Implementation of data Sovereignty in Digital Ecosystems;res...
来源: 评论
Verifiable Credentials with privacy-Preserving Tamper-Evident Revocation Mechanism  5
Verifiable Credentials with Privacy-Preserving Tamper-Eviden...
收藏 引用
5th International conference on Blockchain Computing and applications, BCCA 2023
作者: Xu, Li Li, Tianyu Erkin, Zekeriya Delft University of Technology Cyber Security Group Delft Netherlands
Verifiable Credential (VC) is a new standard proposed by the W3C association to facilitate the expression and verification of third-party-verified credentials on the Internet, such as passports or diplomas. However, t... 详细信息
来源: 评论