咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是411-420 订阅
排序:
FVSS-Based Secure database for IoT Cloud Platform  7
FVSS-Based Secure Database for IoT Cloud Platform
收藏 引用
7th International conference on Digital Arts, Media and Technology, DAMT 2022 and 5th ECTI Northern Section conference on Electrical, Electronics, Computer and Telecommunications Engineering, NCON 2022
作者: Attasena, Varunya Satiramatekul, thitipong Suebsaiprom, Pichet Engkaninan, Anumat Phadermrod, Boonyarat Kamphaeng Saen Kasetsart University Faculty of Engineering Nakhon Pathom Thailand
IoT cloud platforms integrate streaming data generated by heterogeneous devices and also profoundly affected in many application domains. However, public clouds still be concerned about the data security of their data... 详细信息
来源: 评论
7th Workshop on the security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021
7th Workshop on the Security of Industrial Control Systems a...
收藏 引用
7th Workshop on the security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2021, 5th International Workshop on security and privacy Requirements Engineering, SECPRE 2021, 4th International Workshop on Attacks and Defenses for Internet-of-things, ADIoT 2021, 3rd Workshop on security, privacy, Organizations, and Systems Engineering, SPOSE 2021, 2nd Cyber-Physical security for Critical Infrastructures Protection, CPS4CIP 2021 and 1st International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT and SECOMANE 2021 held in conjunction with 26th European Symposium on Research in Computer security, ESORICS 2021
the proceedings contain 32 papers. the special focus in this conference is on security of Industrial Control Systems and of Cyber-Physical Systems. the topics include: privacy and Informational Self-determination thro...
来源: 评论
proceedings - 2022 5th International conference on Electronics and Electrical Engineering Technology, EEET 2022
Proceedings - 2022 5th International Conference on Electroni...
收藏 引用
5th International conference on Electronics and Electrical Engineering Technology, EEET 2022
the proceedings contain 42 papers. the topics discussed include: a cyber security monitoring approach for low-voltage distributed generation control system using both network traffic data and side-channel information;...
来源: 评论
application of data mining technology in power marketing data analysis system  5
Application of data mining technology in power marketing dat...
收藏 引用
5th International conference on Mechatronics and Computer Technology Engineering, MCTE 2022
作者: Xu, Jia-Ning Zhang, Wei Lou, Fei Chen, Qi-Rui Jiang, Ying Marketing Service Center of State Grid Zhejiang Electric Power Co. Ltd China
In order to further improve the level of analysis and application of power marketing data, in this research, based on the emerging data mining technology, starting with the overall architecture, several important comp... 详细信息
来源: 评论
Research on the application of Blockchain Digital Forensics Architecture Based on the DIKW Graph Model in the Police Forensic Process  25
Research on the Application of Blockchain Digital Forensics ...
收藏 引用
25th IEEE International conferences on High Performance Computing and Communications, 9th International conference on data Science and Systems, 21st IEEE International conference on Smart City and 9th IEEE International conference on Dependability in Sensor, Cloud and Big data Systems and applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Liu, Tingwei Cheng, Hexiang Liu, Yanfei Duan, Yucong Wang, Zhenhua Chongqing Police College Department of Public Security ChongQing China Administrative Law School Southwest University of Political Science and Law Chong Qing China Tianjin University Chongqing Police College Department of Intelligence and Computing Department of Information Security ChongQing China School of Computer Science and Technology Hainan University Haikou China Chongqing Police College Department of Tactics ChongQing China
this study explores the application of a blockch-ain-based digital forensics architecture using the DIKW (data, Information, Knowledge, Wisdom) graph in police investigations. Current digital intelligence systems usua... 详细信息
来源: 评论
security threats from Bitcoin Wallet Smartphone applications: Vulnerabilities, Attacks, and Countermeasures  21
Security Threats from Bitcoin Wallet Smartphone Applications...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Hu, Yiwen Wang, Sihan Tu, Guan-Hua Xiao, Li Xie, Tian Lei, Xinyu Li, Chi-Yu Michigan State Univ Dept Comp Sci & Engn E Lansing MI 48824 USA Natl Chiao Tung Univ Dept Comp Sci Hsinchu Taiwan
Nowadays, Bitcoin is the most popular cryptocurrency. With the proliferation of smartphones and the high-speed mobile Internet, more and more users have started accessing their Bitcoin wallets on their smartphones. Us... 详细信息
来源: 评论
Integrating security and privacy in HCD-Scrum  21
Integrating Security and Privacy in HCD-Scrum
收藏 引用
14th Biannual conference of the Italian-SIGCHI-Chapter (CHIItaly)
作者: Baldassarre, Maria Teresa Santa Barletta, Vita Caivano, Danilo Piccinno, Antonio Univ Bari Aldo Moro Dept Comp Sci Bari Italy
Nowadays, software development must face the challenge of integrating security and privacy elements from the earliest stages of any software development process. A correct and complete implementation starting from the... 详细信息
来源: 评论
Message from the General Chairs and PC Chairs TPS-ISA 2023
Proceedings - 2023 5th IEEE International Conference on Trus...
收藏 引用
proceedings - 2023 5th IEEE International conference on Trust, privacy and security in Intelligent Systems and applications, TPS-ISA 2023 2023年 XI页
作者: Nepal, Surya Vaidya, Jaideep Ferrari, Elena Palanisamy, Balaji Data61/CSIRO Australia Rutgers University United States University of Insubria Italy University of Pittsburgh United States
来源: 评论
Blockchain-Based Zero-Knowledge Proofs for data privacy: Explore the application of Blockchain Technology in facilitating privacy-Preserving Transactions through Zero-Knowledge Proofs and Analyze their Effectiveness in Protecting Sensitive data.  23
Blockchain-Based Zero-Knowledge Proofs for Data Privacy: Exp...
收藏 引用
proceedings of the 5th International conference on Information Management & Machine Intelligence
作者: Shashank Saroop CSE_ ASET Amity University Gurugram India and CSE_ASET Amity University Gurugram India
In recent years, the increasing prevalence of digital transactions and data sharing has underscored the critical importance of privacy and security in the digital realm. Blockchain technology, initially designed to su... 详细信息
来源: 评论
We Can Pay Less : Coordinated False data Injection Attack Against Residential Demand Response in Smart Grids  21
We Can Pay Less : Coordinated False Data Injection Attack Ag...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Dayaratne, thusitha Rudolph, Carsten Liebman, Ariel Salehi, Mahsa Monash Univ Clayton Vic Australia
Advanced metering infrastructure, along with home automation processes, is enabling more efficient and effective demand-side management opportunities for both consumers and utility companies. However, tight cyber-phys... 详细信息
来源: 评论