咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是371-380 订阅
排序:
Radioactive Waste Repackaging Methods Based on Genetic Algorithms and Simulation for Reactor Decommissioning  5
Radioactive Waste Repackaging Methods Based on Genetic Algor...
收藏 引用
5th International conference on Computer, Big data and Artificial Intelligence, ICCBD+AI 2024
作者: Wu, Tong Wang, Deying Chen, Fengjuan Zhang, Nan Yang, Fan Wang, Jiaqi Xu, Meng Computer Application Institute of Nuclear Industry Beijing China Beijing University of Technology Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing China
After going through the lifecycle of design, construction, and operation, nu-clear reactors need go to decommissioning phase according to requirement of nuclear regulator or need of environmental protection. Decommiss... 详细信息
来源: 评论
application of Personnel Safety Management System in Network security Guarantee  5
Application of Personnel Safety Management System in Network...
收藏 引用
5th International conference on Information Technologies and Electrical Engineering, ICITEE 2022
作者: Wu, Guofang Dong, Guoliang Xu, Shuquan Research Institute of Highway Ministry of Transport Xitucheng Road 8# Haidian District Beijing China
the rapid development of cloud protection technology provides high-quality security protection barriers for the security of websites deployed on the Internet from a technical level. After the website administrators pa... 详细信息
来源: 评论
Reflections on a Decade of Mobile security Research  22
Reflections on a Decade of Mobile Security Research
收藏 引用
15th acm conference on security and privacy in Wireless and Mobile Networks (acm WiSec)
作者: Enck, William North Carolina State Univ Raleigh NC 27695 USA
the emergence of the smartphone in the late 2000s occurred during a perfect storm of technology and society. Advances in embedded technologies provided a critical balance of computing power and energy consumption. the... 详细信息
来源: 评论
A Review on security-Based Routing Protocols for Vehicular Ad Hoc Networks  5
A Review on Security-Based Routing Protocols for Vehicular A...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Patil, Anand N. Mallapur, Sujata V. Department of CSE Kalaburagi India Department of CSE Kalaburagi India
A sub group of mobile ad hoc network(MANET) that is vehicular Ad Hoc Network (VANET) that assists in, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) intercommunications. An important characteristics of V... 详细信息
来源: 评论
Towards Efficient Labeling of Network Incident datasets Using Tcpreplay and Snort  21
Towards Efficient Labeling of Network Incident Datasets Usin...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Masumi, Kohei Han, Chansu Ban, Tao Takahashi, Takeshi Natl Inst Informat & Commun Technol Tokyo Japan
Research on network intrusion detection (NID) requires a large amount of traffic data with reliable labels indicating which packets are associated with particular network attacks. In this paper, we implement a prototy... 详细信息
来源: 评论
security Issues and Challenges in Internet of things (IoT) System  5
Security Issues and Challenges in Internet of Things (IoT) S...
收藏 引用
5th International conference on Contemporary Computing and Informatics, IC3I 2022
作者: Beltran, Joel Alanya Mudholkar, Pankaj Mudholkar, Megha Tripathi, Vikas Valderrama-Zapata, Carlos Lourense, Melanie Universidad Tecnológica Del Perú Peru Marwadi University Department of Computer Applications Gujarat Rajkot India Thakur Institute of Management Studies Career Development & Research Department of MCA Maharashtra Mumbai India Graphic Era Deemed to Be University Department of CSE Uttarakhand Dehradun India Universidad San Ignacio de Loyola Peru Durban Universwity of Technology Department of Human Resource Management Durban Berea South Africa
Significant privacy and security concerns apply to the Internet of things. IoT issues might include driver ignorance, inadequate device updates, a lack of robust and effective safeguards, and unreliable dynamic instru... 详细信息
来源: 评论
Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing  5th
Securely and Efficiently Nearest Neighbor Query Scheme Based...
收藏 引用
5th International conference on Frontiers in Cyber security (FCS)
作者: Feng, Qikai Liu, Bai Hubei Univ Technol Wuhan 430068 Peoples R China
With the wide application of machine learning algorithms in medical diagnosis, we gradually confronted the problem of computing and storing large-scale data. Outsourcing cloud computing has become the most cost-effect... 详细信息
来源: 评论
Cloud Computing using OWASP: Open Web application security Project  7
Cloud Computing using OWASP: Open Web Application Security P...
收藏 引用
7th International conference on Intelligent Computing and Control Systems, ICICCS 2023
作者: Jahanavi, Gangineni Mubeen, Tasmiya Aishwarya, R. Yogitha, R. Sathyabama Institute of Science and Technology Department of CSE India
Sharing data while ensuring its security is a difficult task nowadays. Users submit files in a data sharing system that have been encrypted using an encryption key. Any system for large-scale data exchange has to have... 详细信息
来源: 评论
Research on optimization algorithm in grid engineering survey data acquisition and processing based on cloud computing  5
Research on optimization algorithm in grid engineering surve...
收藏 引用
5th International conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Zhang, Jiyong Sun, Xiaohu Huang, Bing Liu, Donghui Ren, Peixiang State Grid Economics and Technology Research Institute Co. Ltd. Beijing102209 China
With the increasing scale of power grids and the growing demand for intelligence, efficient and accurate collection and processing of grid engineering survey data has become critical. this study aims to explore the op... 详细信息
来源: 评论
A Large Publicly Available Corpus of Website privacy Policies Based on DMOZ  21
A Large Publicly Available Corpus of Website Privacy Policie...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Zaeem, Razieh Nokhbeh Barber, K. Suzanne Univ Texas Austin Ctr Ident Austin TX 78712 USA
Studies have shown website privacy policies are too long and hard to comprehend for their target audience. these studies and a more recent body of research that utilizes machine learning and natural language processin... 详细信息
来源: 评论