咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是41-50 订阅
排序:
Hanuma: An Advanced Safety Solution Using GPS and Sensor Technologies for Women's security  5
Hanuma: An Advanced Safety Solution Using GPS and Sensor Tec...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Sunitha, M. Raghavendra, C. Alekya Rani, Y. Srujan, S. Nihar, K. CVR College of Engineering Department of Cyber Security Hyderabad India Hyderabad India
Hanuma is an innovative Android application designed to empower women in emergency situations. By integrating advanced sensor technology, it automatically sends pre-programmed emergency messages, including real-time G... 详细信息
来源: 评论
Integrating Federated Learning and IoT for privacy-Preserving Smart Healthcare Systems  5
Integrating Federated Learning and IoT for Privacy-Preservin...
收藏 引用
5th International conference on Sustainable Communication Networks and application, ICSCNA 2024
作者: Revathy, G. Nandhini, T. Senthilvadivu, S. Mariyammal, M. Sastra Deemed University Srinivasa Ramunjan Centre Department of CSE Tamil Nadu Kumbakonam India Pioneer college of arts and science Department of CS Coimbatore India Saveetha University Department of CSE Chennai India Chennai Institute of technology Department of CSE Chennai India
Significant privacy issues have been raised by the massive amounts of sensitive health data generated by the Internet of things' (IoT) rapid proliferation of smart healthcare systems. Researchers are looking into ... 详细信息
来源: 评论
Convergence of Blockchain and Iot  5th
Convergence of Blockchain and Iot
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Gopichand, G. Aleti, Rajashekar Tarini, Ranjana R. Tallam, Rahul Yenigandla, Venislaus Ashish Vellore Inst Technol Vellore Tamil Nadu India
A network of commonplace physical things with electronic parts, such as sensors, processors, and wireless communication modules is referred to as the "Internet of things" (IoT). they can communicate with one... 详细信息
来源: 评论
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem  24
Nothing Personal: Understanding the Spread and Use of Person...
收藏 引用
14th acm conference on data and application security and privacy (acm CODASPY)
作者: Zaeifi, Mehrnoosh Kalantari, Faezeh Oest, Adam Sun, Zhibo Ahn, Gail-Joon Shoshitaishvili, Yan Bao, Tiffany Wang, Ruoyu Doupe, Adam Arizona State Univ Tempe AZ 85287 USA Drexel Univ Philadelphia PA USA
Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA). However, financial service providers face a uni... 详细信息
来源: 评论
Uncovering security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services  24
Uncovering Security Vulnerabilities in Real-world Implementa...
收藏 引用
17th acm conference on security and privacy in Wireless and Mobile Networks (WiSec)
作者: Yang, Yaru Zhang, Yiming Wan, Tao Wang, Chuhan Duan, Haixin Chen, Jianjun Li, Yishen Tsinghua Univ Beijing Peoples R China CableLabs Louisville KY USA Carleton Univ Ottawa ON Canada Quancheng Lab Jinan Peoples R China Zhongguancun Lab Beijing Peoples R China
5G messaging services, based on Global System for Mobile Communications Association (GSMA) Rich Communication Service (RCS) and 3rd Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS), have been deploy... 详细信息
来源: 评论
privacy Protection and data security Enhancement (PPDSE) Model in Student Management Information Systems  5
Privacy Protection and Data Security Enhancement (PPDSE) Mod...
收藏 引用
5th International conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Pan, Baoli Shandong Agriculture and Engineering University School of Humanities Shandong Jinan250100 China
the implementation of a privacy Protection and data security Enhancement (PPDSE) model within Student Management Information Systems (SMIS) is critical for protecting sensitive information in educational institutions.... 详细信息
来源: 评论
the Design of an Ontology for ATT&CK and its application to Cybersecurity  23
The Design of an Ontology for ATT&CK and its Application to ...
收藏 引用
13th acm conference on data and application security and privacy (CODASPY)
作者: Akbar, Khandakar Ashrafi Halim, Sadaf Md Singhal, Anoop Abdeen, Basel Khan, Latifur thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA Natl Inst Stand & Technol Gaithersburg MD 20899 USA
the spread of attacks in computer networks and within systems can have severe consequences for both individuals and organizations. One approach to preventing the spread of attacks is to use ontological aid, which is t... 详细信息
来源: 评论
Transforming Coupon Service with Blockchain:-Reinventing security  5th
Transforming Coupon Service with Blockchain:-Reinventing Sec...
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Neeli, Shrenika Kumar, B. Vijay Kommu, Siddartha Yerra, Harini JB Inst Engn & Technol Dept Informat Technol Hyderabad India
As online shopping and stores become more popular, the need for electronic coupons is also growing. An electronic coupon (e-coupon) tools are used for various marketing tasks like boosting sales, promoting brands, etc... 详细信息
来源: 评论
A Comprehensive Review of Soft Computing Enabled Techniques for IoT security: State-of-the-Art and Challenges Ahead  5th
A Comprehensive Review of Soft Computing Enabled Techniques ...
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Parabrahmachari, Sriram Narayanasamy, Srinivasan Sathyabama Inst Sci & Technol Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India Rajalakshmi Engn Coll Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India
In the past ten years, the Internet of things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and ra... 详细信息
来源: 评论
Technical Concepts on Cloud security and privacy Using Deep Learning Techniques and Hybridized Encryption  5th
Technical Concepts on Cloud Security and Privacy Using Deep ...
收藏 引用
5th International conference on data Science, Machine Learning and applications
作者: Rajchandar, K. Madanan, Mukesh Sastry, R. V. L. S. N. Saxena, Monika SR Univ Sch CS & AI Warangal Telangana India Dhofar Univ Dept Comp Sci Salalah Oman GIET Univ Sch Comp Sci & Engn Gunupur Orisha India Banasthali Vidyapith Dept Comp Sci Banasthali India
the current research questions that are raising concern security in cloud computing. Cloud storage is replacing traditional data storage in numerous companies because it provides instant knowledge of data from any loc... 详细信息
来源: 评论