咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是271-280 订阅
排序:
Enhanced security Measures Against Phishing threats  5
Enhanced Security Measures Against Phishing Threats
收藏 引用
5th International conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Tamilkodi, R. Harika, A. Harika, Mogalapalli Abhilash, P. Venkata Sai Sai, Chenagana Harish Pranav, P.S. A.P. Rajahmundry India A.P. Rajahmundry India
the rapid advancement of digital transformation has significantly heightened cybersecurity threats on a global scale. As digitization progresses, it creates more opportunities for cybercriminals. One prevalent form of... 详细信息
来源: 评论
Implementation of Power Meter System security in Smart Grids with QRNG Method  5
Implementation of Power Meter System Security in Smart Grids...
收藏 引用
5th IEEE International conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Patel, Aum Shrivastava, Simran Sujatha, G. Srm Institute of Science and Technology School of Computing College of Engineering and Technology Faculty of Engineering and Technology Department of Networking and Communications Chennai India
Smart grids face emerging threats as connectivity expands attack surfaces. To strengthen smart meter data encryption through optimized integration of a cloud-based quantum random number generator (QRNG) service. QRNGs... 详细信息
来源: 评论
From Attacks to Insights: XAI and Defense in Network security  5
From Attacks to Insights: XAI and Defense in Network Securit...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Kumar, Bharathi Ganesh Shanthini, E. PSG College of Technology Department of Computer Science and Engineering Tamil Nadu India Sri Ramakrishna Engineering College Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India
Network intrusion poses significant threats to cyber security, as malicious attacks can disrupt systems and compromise sensitive information. Real-world scenarios include unauthorized access to corporate networks, dat... 详细信息
来源: 评论
Secure Multi-Party Computation for Digital Assets Custody Purpose-Analysis of Open-Source Implementations  5
Secure Multi-Party Computation for Digital Assets Custody Pu...
收藏 引用
5th International conference on Blockchain Computing and applications, BCCA 2023
作者: Roszak, Daniel Jaroucheh, Zakwan School of Computing Engineering & the Built Environment Edinburgh Napier University United Kingdom
the increasing incidents of digital asset theft have highlighted vulnerabilities in their secure management and storage. In this context, Multi-party computation (MPC) emerges as a game-changing solution, offering rob... 详细信息
来源: 评论
security identification of abnormal access to network databases based on GSA-SVM algorithm and deep features  5
Security identification of abnormal access to network databa...
收藏 引用
5th International conference on Computer Communication and Network security, CCNS 2024
作者: Jiang, Yuchen Jia, Zhen Liu, Wenting Yang, Luyu Liu, Haitao State Grid Information & Telecommunication Branch Beijing100761 China
In response to the problem of low success rate in identifying abnormal access security in network databases, a network database abnormal access security identification method based on GSA-SVM algorithm and deep featur... 详细信息
来源: 评论
Research progress and prospects of water quality models in water quality prediction of Danjiangkou Reservoir  5
Research progress and prospects of water quality models in w...
收藏 引用
5th International conference on Green Energy, Environment, and Sustainable Development, GEESD 2024
作者: Jiang, Haochen Zhang, Jing Beijing Laboratory of Water Resources Security Capital Normal University Beijing100048 China The Key Lab of Resource Environment and GIS of Beijing Capital Normal University Beijing100048 China
this article predominantly studies the application of water quality models in Danjiangkou Reservoir, and explores the principles and research progress of water quality models. Subsequently, the application of water qu... 详细信息
来源: 评论
A Study on Large Scale applications of Big data in Modern Era  5
A Study on Large Scale Applications of Big Data in Modern Er...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Kapadiya, Dharmi Shekhawat, Chezal Sharma, Priyanka Swami Keshvanand Institute of Technology Management & Gramothan Rajasthan Jaipur302017 India
Big data has brought a profound revolution across industries, redefining data management and decision-making paradigms. the utilization of vast and diverse datasets enables institutions to make more informed risk asse... 详细信息
来源: 评论
Cryptographic algorithm development and application for encryption and decryption  5
Cryptographic algorithm development and application for encr...
收藏 引用
5th International conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Pitale, Rahul Tajane, Kapil Mahajan, Prathamesh Nehate, Nishita Mulimani, Apeksha Lokhande, Devarsh Pimpri Chinchwad College of Engineering Akurdi Railway Station Road Sector No.26 Maharastra Nigdi411044 India
Cryptographic algorithms are used to maintain the data confidentiality and integrity. In the era of ubiquitous digital communication and information exchange, the security of sensitive data has become a paramount conc... 详细信息
来源: 评论
Social security Event Prediction Based on Machine Learning  5
Social Security Event Prediction Based on Machine Learning
收藏 引用
5th International conference on Industrial IoT, Big data and Supply Chain, IIoTBDSC 2024
作者: Li, Chang Jin, Tianye School of International Relations Guangdong University of Foreign Studies Guangzhou China School of Humanities Law Northeastern University Boston United States
In the construction and development of modern society, prediction, as an effective technology to evaluate the development trend and future state of things, can scientifically deal with the problems existing in traditi... 详细信息
来源: 评论
application of LSTM for Differentiating Real and Fake Bank Names from Provided Uniform Resource Locator  5
Application of LSTM for Differentiating Real and Fake Bank N...
收藏 引用
5th International conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Dashrath, Prajakta Giri, Manish India
the most crucial element of our everyday activities is security. As we progress in life, we must constantly keep our financial situation in mind. A phony online or offline transfer could result in an inevitable loss i... 详细信息
来源: 评论