咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是261-270 订阅
排序:
the First Early Evidence of the Use of Browser Fingerprinting for Online Tracking  25
The First Early Evidence of the Use of Browser Fingerprintin...
收藏 引用
34th acm Web conference, WWW 2025
作者: Liu, Zengrui Dani, Jimmy Cao, Yinzhi Wu, Shujiang Saxena, Nitesh Nanjing University of Finance and Economics Nanjing China Texas A&M University College StationTX United States Johns Hopkins University BaltimoreMD United States F5.Inc SeattleWA United States
While advertising has become commonplace in today’s online interactions, there is a notable dearth of research investigating the extent to which browser fingerprinting is harnessed for user tracking and targeted adve... 详细信息
来源: 评论
Analysis of Information Quality and data security in the KPU (General Elections Commission) SIDALIH (Voter data Information System) application  5th
Analysis of Information Quality and Data Security in the KPU...
收藏 引用
5th International conference on HCI for Cybersecurity, privacy and Trust, HCI-CPT 2023, held as part of the 25th International conference on Human-Computer Interaction, HCII 2023
作者: Raharja, Jaka Nurmandi, Achmad Misran Subekti, Dimas Department of Government Affairs and Administration Yogyakarta Muhammadiyah University Yogyakarta Indonesia Department of Government Affairs and Administration Jusuf Kalla School of Government Muhammadiyah University Yogyakarta Indonesia
the purpose of this study was to determine the quality of services provided and data security in the use of the KPU’s SIDALIH (Voter data Information System) application. this research uses qualitative methods by ana... 详细信息
来源: 评论
A homomorphic encryption-based leakage prevention method for cross-domain circulation of sensitive network data  5
A homomorphic encryption-based leakage prevention method for...
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Bao, Liang Li, Zhiqi Luo, Fucai Sun, Wangshu Yang, Yang The Third Research Institute of Ministry of Public Security Pudong New Area Shanghai200120 China Co. Ltd. Changping District Beijing102200 China State Grid Fujian Electric Power Co. Ltd. Fujian Fuzhou350001 China State Grid Zhejiang Electric Power Co. Ltd. Zhejiang Hangzhou311500 China
After the application of anti leakage methods, it is easy to re encrypt, resulting in poor anti leakage performance of data flow across domains. therefore, it is necessary to design a new cross domain cyclic anti leak... 详细信息
来源: 评论
Virtual Board based data Sharing application Using Cloud Computing  5
Virtual Board based Data Sharing Application Using Cloud Com...
收藏 引用
5th IEEE International conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Gupta, Meenu Kumar, Rakesh Kumar, Abhishake Chaurasia, Prateek Chandigarh University Department Of Cse Punjab Mohali India
the concept of cloud computing becomes the more popular solution for managing data in recent years. Cloud computing provides several other advantages over traditional on-premises databases along with the ability to st... 详细信息
来源: 评论
Secure data Transmission Based on Artificial Intelligence Using IoT in security Systems  5
Secure Data Transmission Based on Artificial Intelligence Us...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Senthil Kumar, S. Maruthaveni, R. Jayanthi, N. Yadav, Ajay Kumar Kalaiarasan, T.R. Sri Ramakrishna Mission Vidyalaya College of Arts and Science Department of Information Technology Coimbatore India Dr.S N S Rajalakshmi College of Arts and Science Department of Computer Science Coimbatore India Deemed to Be University Periyar Maniammai Institute of Science and Technology Department of Commerce Thanjavur India United Institute of Management Department of Computer Application U.P. Prayagraj India Sri Krishna College of Engineering and Technology Dept of Information Technology Coimbatore India
the Internet of things (IoT), a rapidly expanding and constant technology today, enables the efficient exchange of information and control of electronic equipment. As technology grows more and more integrated into our... 详细信息
来源: 评论
Enhanced Agricultural Decision-Making: Merging Climatic data with Machine Learning Algorithms  5
Enhanced Agricultural Decision-Making: Merging Climatic Data...
收藏 引用
5th International conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Rathi, Snehal Wamanacharya, Shubham Shah, Samkit Khedkar, Vijayshri BTACT'S Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Symbiosis Institute of Technology Department of Computer Science & Engineering Pune India
Climate change still implies risks for economic security, such as for agriculture and its productivity and, therefore, national economic potential. Although similar approaches have been used in publications concerning... 详细信息
来源: 评论
Experimental Evaluation of Blockchain Based Drug Supply Chain Management System to Ensure Transparency and Traceability  5
Experimental Evaluation of Blockchain Based Drug Supply Chai...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Manoharan, Jayapreethi Suguna, T. Ahmed, Shakeb Patnaik, K.G.K. Gopinath, D. Penyameen, K. Saveetha School of Law Saveetha Institute of Medical and Technical Sciences Chennai77 India Vignans Institute of Engineering for women Department of management studies Andhrapradesh India MGVs Arts Commerce and Science College Maharashtra Malegaon India Department of Management Studies Visakhapatnam India Department of Computer Science Karnataka Bengaluru India Velammal College of Engineering and Technology Madurai India
the pharmaceutical industry faces significant challenges in maintaining the transparency and traceability of drugs throughout the supply chain, leading to issues such as counterfeit drugs and inefficiencies in drug di... 详细信息
来源: 评论
Query Method of Multi-Source data in Distribution Network  5
Query Method of Multi-Source Data in Distribution Network
收藏 引用
5th International conference on Decision Science and Management, ICDSM 2023
作者: Huang, Lei Tian, Hanlin Yang, Daixi Mao, Xiaoyi Long, Li Tongren Power Supply Bureau of Guizhou Power Grid Co. Ltd Guizhou China
this paper provides a query method and system for multi-source data, which belongs to the database field, including receiving data access requests from business applications, forwarding the access requests to the data... 详细信息
来源: 评论
Preventing Fraud in E-tickets Validation Using the 2FA Approach  5
Preventing Fraud in E-tickets Validation Using The 2FA Appro...
收藏 引用
5th International conference on Computer and applications, ICCA 2023
作者: Alnuaimi, Lolwa Hassan Jaam, Jihad Al John Moores University School of Computing and Data Sciences Dept. of Computer Science Oryx Universal College in Partnership with Liverpool Doha Qatar
Electronic ticketing (e-ticket) systems employing QR codes or barcodes are essential in the digital era but come with cybersecurity risks like fraud, counterfeiting, and ticket scalping. this study explores the cybers... 详细信息
来源: 评论
application of Machine Learning Techniques for Heavy Rainfall Prediction using Satellite data  5
Application of Machine Learning Techniques for Heavy Rainfal...
收藏 引用
5th International conference on Smart Electronics and Communication, ICOSEC 2024
作者: Balram, Gujjari Poornachandrarao, N. Ganesh, D. Nagesh, Banavath Basi, Reddy.A Kumar, M.Sunil Anurag University Ghatkesar Rd Venkatapur Telangana Hyderabad500088 India Geethanjali College of Engineering and Technology Hyderabad Telangana Cheeryal India Andhra Pradesh Tirupati India Marri Laxman Reddy Institute of Technology and Management Department of Cyber Security Hyderabad Telangana Dundigal500043 India
this study presents a large-scale lunar dataset with the goal of utilizing machine learning techniques to forecast periods of intense rain. the dataset includes features from the lunar surface such as slope, height an... 详细信息
来源: 评论