咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是421-430 订阅
排序:
A Fine-Grained Telemetry Stream for security Services in 5G Open Radio Access Networks  1
A Fine-Grained Telemetry Stream for Security Services in 5G ...
收藏 引用
1st acm International Workshop on Emerging Topics in Wireless (Emerging Wireless) Part of 18th International conference on Emerging Networking Experiments and Technologies (CoNEXT)
作者: Wen, Haohuang Porras, Phillip Yegneswaran, Vinod Lin, Zhiqiang Ohio State Univ Columbus OH 43210 USA SRI Int Menlo Pk CA USA
the Open Radio Access Network (O-RAN) is an emerging paradigm for developing the next-generation radio access network (RAN) for 5G and beyond. Inspired by the principles from software-defined networks (SDNs), the key ... 详细信息
来源: 评论
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention  21
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Pre...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Zahran, Bassam Hussaini, Adamu Ali-Gombe, Aisha Towson Univ Towson MD 21252 USA
As IT/OT convergence continues to evolve, the traditionally isolated ICS/OT systems are increasingly exposed to a myriad of online and offline threats. Although IIoT enhances the reachability in ICS, improved data ana... 详细信息
来源: 评论
API-Based Personal Healthcare application: Securing data and Ensuring Patient privacy
API-Based Personal Healthcare Application: Securing Data and...
收藏 引用
Information Engineering (ACIE), IEEE Asia conference on
作者: Watcharachai Kongsiriwattana Ratabhoom Boongate thanaphas Laohasinnuruk Areej Meny Rudsada Kaewsaeng-On Khanista Namee Faculty of Industrial Technology and Management King Mongkut's University of Technology North Bangkok Bangkok Thailand King Saud bin Abdulaziz University for Health Sciences Jeddah Saudi Arabia Prince of Songkla University Songkla Thailand
this paper presents the development of a secure mobile healthcare application designed to provide patients with real-time access to their medical records using advanced API technology. the system ensures data privacy ... 详细信息
来源: 评论
MLHat: Deployable Machine Learning for security Defense  21
MLHat: Deployable Machine Learning for Security Defense
收藏 引用
27th acm SIGKDD International conference on Knowledge Discovery and data Mining (KDD)
作者: Wang, Gang Ciptadi, Arridhana Ahmadzadeh, Ali UIUC Champaign IL 61820 USA TruEra Redmond WA USA Blue Hexagon San Francisco CA USA
the MLHat workshop aims to bring together academic researchers and industry practitioners to discuss the open challenges, potential solutions, and best practices to deploy machine learning at scale for security defens... 详细信息
来源: 评论
Research and Implementation of Operation Monitoring and Resource Scheduling Methods Based on the Digital Twin Model of the Power Grid  5
Research and Implementation of Operation Monitoring and Reso...
收藏 引用
5th International conference on Applied Machine Learning, ICAML 2023
作者: Qiao, Junfeng Yu, Hai He, Zhimin Shen, Lianteng Du, Xiaodong State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection & Monitoring Technology Nanjing China China Electric Power Research Institute Co. Ltd Beijing China State Grid Hebei Electric Power Co. Ltd Shijiazhuang China
the digital twin model of the power grid has been widely applied in fields such as power equipment status acquisition and power equipment fault analysis. the use of digital twin models to virtual equipment status para... 详细信息
来源: 评论
Algebraic Replicated data Types: Programming Secure Local-First Software  37
Algebraic Replicated Data Types: Programming Secure Local-Fi...
收藏 引用
37th European conference on Object-Oriented Programming, ECOOP 2023
作者: Kuessner, Christian Mogk, Ragnar Wickert, Anna-Katharina Mezini, Mira Technische Universität Darmstadt Germany hessian.AI Darmstadt Germany
this paper is about programming support for local-first applications that manage private data locally, but still synchronize data between multiple devices. Typical use cases are synchronizing settings and data, and co... 详细信息
来源: 评论
5th International conference on Frontiers in Cyber security, FCS 2022
5th International Conference on Frontiers in Cyber Security,...
收藏 引用
5th International conference on Frontiers in Cyber security, FCS 2022
the proceedings contain 26 papers. the special focus in this conference is on Frontiers in Cyber security. the topics include: threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an A...
来源: 评论
Towards Accurate Labeling of Android Apps for Reliable Malware Detection  21
Towards Accurate Labeling of Android Apps for Reliable Malwa...
收藏 引用
11th acm conference on data and application security and privacy (CODASPY)
作者: Salem, Aleieldin Tech Univ Munich Garching Germany
In training their newly-developed malware detection methods, researchers rely on threshold-based labeling strategies that interpret the scan reports provided by online platforms, such as VirusTotal. the dynamicity of ... 详细信息
来源: 评论
Tor Traffic's Representation and Classification Based on Packet Timing Characteristics  5
Tor Traffic's Representation and Classification Based on Pac...
收藏 引用
5th International conference on Advanced Electronic Materials, Computers and Software Engineering, AEMCSE 2022
作者: Yin, Haozhan Cao, Jinxuan Jiang, Shouzhi Lu, Tianliang People's Public Security University of China College of Information Network Security Beijing China
Tor provides users with great anonymity due to its multi-layer proxy operating mechanism, but also provides living space for illegal and criminal activities. It is necessary to further analyze users' behaviors bas... 详细信息
来源: 评论
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation  21
Secure Pull Printing with QR Codes and National eID Cards: A...
收藏 引用
11th acm conference on data and application security and privacy, CODASPY 2021
作者: Leonelli, Matteo Morelli, Umberto Sciarretta, Giada Ranise, Silvio Fondazione Bruno Kessler Trento Italy Fondazione Bruno Kessler University of Trento Trento Italy
With more systems becoming digitised, enterprises are adopting cloud technologies and outsourcing non-critical services to reduce the pressure on IT departments. In this process, it is crucial to achieving the right b... 详细信息
来源: 评论