咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是241-250 订阅
排序:
ARES 2023 - 18th International conference on Availability, Reliability and security, proceedings
ARES 2023 - 18th International Conference on Availability, R...
收藏 引用
18th International conference on Availability, Reliability and security, ARES 2023
the proceedings contain 155 papers. the topics discussed include: an android application patching pipeline based on generic changesets;Nakula: coercion resistant data storage against time-limited adversary;automated s...
来源: 评论
application of Time Series Analysis in Predicting Industrial data security Events  5
Application of Time Series Analysis in Predicting Industrial...
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Liu, Caiyun Sun, Yan Liu, Yitong National Industrial Information Security Development Research Center Beijing100040 China
In today's industrial operations, the widespread application of digital technology has made industrial data security an increasingly important focus. Industrial data encompasses vital information in key areas such... 详细信息
来源: 评论
application of BeiDou-3 data transmission technology on the buoy light at sea  5
Application of BeiDou-3 data transmission technology on the ...
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Li, Jianyong Zhu, Chuanying Tianjin AtoN division The Navigation Guarantee Center of North China Sea Tianjin300456 China
Aids remote monitoring system is an important way to aids maintenance, which plays an important role of improving the maintenance quality of the aids. the communication effect would affect the management level of aids... 详细信息
来源: 评论
SmartFusion2 SoC as a security Module for the IoT world  22
SmartFusion2 SoC as a Security Module for the IoT world
收藏 引用
19th acm International conference on Computing Frontiers (CF)
作者: Rodrigues, Alexandre Resende, Joao Carlos Chaves, Ricardo Univ Lisbon INESC ID IST Lisbon Portugal
Dedicated computational devices such as HSMs and FPGAs are frequently used to provide data security and privacy. However, these options have several drawbacks, particularly when considering IoT environments. HSMs offe... 详细信息
来源: 评论
Research and application of Cybersecurity Situation Awareness for Smart Grid Power Control System  5
Research and Application of Cybersecurity Situation Awarenes...
收藏 引用
5th IEEE International conference on Civil Aviation Safety and Information Technology, ICCASIT 2023
作者: Zhang, Liang Qu, Gang Ge, Minhui Jin, Haochun East Branch of State Grid Corporation of China Shanghai China
Cybersecurity situational awareness technology holds paramount significance within the network environment of power monitoring systems. It serves to promptly detect and address various network threats, thereby safegua... 详细信息
来源: 评论
Measuring the Deployment of 5G security Enhancement  22
Measuring the Deployment of 5G Security Enhancement
收藏 引用
15th acm conference on security and privacy in Wireless and Mobile Networks (acm WiSec)
作者: Nie, Shiyue Zhang, Yiming Wan, Tao Duan, Haixin Li, Song Tsinghua Univ Beijing Peoples R China CableLabs Louisville KY USA Carleton Univ Ottawa ON Canada QI ANXIN Technol Res Inst Beijing Peoples R China
the fifth-generation(5G) cellular network is entering an era of rapid development. Not only is 5G supposed to be fast, it also offers enhanced security based on 5G security specifications developed by the 3rd Generati... 详细信息
来源: 评论
5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, co-located with the 27th European Symposium on Research in Computer security, ESORICS 2022
5th International Workshop on Emerging Technologies for Auth...
收藏 引用
5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, co-located with the 27th European Symposium on Research in Computer security, ESORICS 2022
the proceedings contain 9 papers. the special focus in this conference is on Emerging Technologies for Authorization and Authentication. the topics include: User Authentication on Headset-Like Devices by Bio...
来源: 评论
security and privacy Challenges in Big data  5
Security and Privacy Challenges in Big Data
收藏 引用
5th National conference of Saudi Computers Colleges, NCCC 2022
作者: Alarjani, Samiha Ahmed, Shakeel King Faisal University Computer Science Department Ccsit Alhassa Saudi Arabia
In recent years, there has been a growing interest in the field of Big data thanks to its benefits, such as cost optimization, improved efficiency, and potential risks identification. Big data has become a widely expl... 详细信息
来源: 评论
Logic Locking over TFHE for Securing User data and Algorithms  24
Logic Locking over TFHE for Securing User Data and Algorithm...
收藏 引用
29th Asia and South Pacific Design Automation conference (ASP-DAC)
作者: Suemitsu, Kohei Matsuoka, Kotaro Sato, Takashi Hashimoto, Masanori Kyoto Univ Dept Commun & Comp Engn Kyoto Japan
this paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input user data and models in machine learning inference applications. With the proposed secure computat... 详细信息
来源: 评论
Optimization of a big data-driven public security policy and regulation Q&A system  5
Optimization of a big data-driven public security policy and...
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Li, Kejun Shen, Yifei Jia, Nan School of Information Network Security People's Public Security University of China Beijing China
With the rapid development of artificial intelligence technology, intelligent question answering systems have shown great potential in various fields. the public security question and answer system is an important app... 详细信息
来源: 评论