咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是511-520 订阅
排序:
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System  5
Research on Setting of Two Firewall Rules Based on Ubuntu Li...
收藏 引用
5th International conference on Computer Network, Electronic and Automation, ICCNEA 2022
作者: Ma, Limei Zhao, Dongmei Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
'security first' is the most concerned issue of Linux administrators. security refers to the integrity of data. the authentication security and integrity of data are higher than the privacy security of data. F... 详细信息
来源: 评论
Network Information security System Based on Information Hiding Technology
Network Information Security System Based on Information Hid...
收藏 引用
5th International conference on Machine Learning and Big data Analytics for IoT security and privacy, SPIoT 2024
作者: Zhou, Jiyin School of Big Data Chongqing Vocational College of Transportation Chongqing Jiangjin402247 China
With the continuous development of information security technology, information hiding technology is gradually valued by people, and its application in network systems is more and more extensive, but the current Compu... 详细信息
来源: 评论
application Status, Problems and Future Prospects of Generative AI in Education
Application Status, Problems and Future Prospects of Generat...
收藏 引用
Computer Science and Technologies in Education (CSTE), International conference on
作者: Hao Yu Zhaoyang Liu Yunyun Guo Department of Education Shaanxi Normal University Xi'an China School of Foreign Languages Northwest University Xi'an China
the emergence of Chat GPT signifies another revolutionary wave of information technology brought about by generative AI. this article introduces the development and technical support of generative AI, revealing that t...
来源: 评论
Power IoT security protection architecture based on zero trust framework  5
Power IoT security protection architecture based on zero tru...
收藏 引用
5th IEEE International conference on Cryptography, security and privacy (CSP)
作者: Zhang Xiaojian Chen Liandong Jie, Fan Wang Xiangqun Wang Qi Global Energy Interconnect Res Inst Co Ltd State Grid Key Lab Informat & Network Secur Nanjing Jiangsu Peoples R China State Grid Hebei Elect Power Co Dept Name State Grid Hebei Informat Nanjing Jiangsu Peoples R China State Grid Hebei Elect Power Co Telecommun Branch Nanjing Jiangsu Peoples R China
the construction of the power Internet of things has led various terminals to access the corporate network on a large scale. the internal and external business interaction and data exchange are more extensive. the cur... 详细信息
来源: 评论
5th International Workshop on Artificial Intelligence for Business Process Management, AI4BPM 2021, 17th International Workshop on Business Process Intelligence, BPI 2021, 1st International Workshop on BPM Governance for and Beyond DigitalTransformation, BPMGOV 2021, 1st International Workshop on Business Process Management and Routine Dynamics, BPM and RD 2021, 14th International Workshop on Social and Human Aspects of Business Process Management, BPMS2 2021, 9th International Workshop on DEClarative, DECision and Hybrid approaches to processes, DEC2H 2021, 5th International Workshop on Business Processes Meet the Internet-of-things, BP-Meet-IoT 2021, 4th International Workshop on security and privacy-enhanced Business Process Management, SPBP 2021 held at 19th International conference on Business Process Management, BPM 2021
5th International Workshop on Artificial Intelligence for Bu...
收藏 引用
5th International Workshop on Artificial Intelligence for Business Process Management, AI4BPM 2021, 17th International Workshop on Business Process Intelligence, BPI 2021, 1st International Workshop on BPM Governance for and Beyond DigitalTransformation, BPMGOV 2021, 1st International Workshop on Business Process Management and Routine Dynamics, BPM and RD 2021, 14th International Workshop on Social and Human Aspects of Business Process Management, BPMS2 2021, 9th International Workshop on DEClarative, DECision and Hybrid approaches to processes, DEC2H 2021, 5th International Workshop on Business Processes Meet the Internet-of-things, BP-Meet-IoT 2021, 4th International Workshop on security and privacy-enhanced Business Process Management, SPBP 2021 held at 19th International conference on Business Process Management, BPM 2021
the proceedings contain 33 papers. the special focus in this conference is on Artificial Intelligence for Business Process Management. the topics include: Process Innovation in the EU Public Sector through the Lens of...
来源: 评论
Improved Layered Architecture: Integration of IoT with Blockchain for Increased security and Scalability
Improved Layered Architecture: Integration of IoT with Block...
收藏 引用
International conference on Artificial Intelligence and data Sciences (AiDAS)
作者: Muhammad Jahangir Ming Jie Lee Ban-Hoe Kwan Tariq Kamal Tong-Yuen Chai Wing Son Loh Lee Kong Chian Faculty of Engineering and Science Universiti Tunku Abdul Rahman Kajang Malaysia Electrical and Computer Engineering Dhanani School of Science & Engineering Karachi Pakistan
Most of the existing Internet of things (IoT) applications are built upon the conventional three-layered architecture that possesses several issues in terms of security, privacy and scalability. In this paper, we prop... 详细信息
来源: 评论
Smart Secure Healthcare Cloud data Model by Fog  5
Smart Secure Healthcare Cloud Data Model by Fog
收藏 引用
5th International conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Maria, Reega Thejus Engineering College Dept. of Computer Science and Engineering Vellarakkad Kerala Thrissur India
Fog computing provides a security model for privacy-preserving healthcare data in the cloud, such as video (surgery footage, endoscope, ultrasound) and images (X-ray, CT scan, MRI). Here, a decoy approach is used to p... 详细信息
来源: 评论
Enhancing data Protection in Cloud Computing using Key Derivation based on Cryptographic Technique  5
Enhancing Data Protection in Cloud Computing using Key Deriv...
收藏 引用
5th International conference on Computing Methodologies and Communication, ICCMC 2021
作者: Suresha, D. Karibasappa, K. Vtu Belagavi India
Cloud computing is one of the emerging information technologies, where millions of users store and access the information. As huge amount of data is stored in cloud data centers, data needs to be protected in all the ... 详细信息
来源: 评论
data privacy Protection Method of Smart IOT Platform Based on Differential privacy  22
Data Privacy Protection Method of Smart IOT Platform Based o...
收藏 引用
proceedings of the 5th International conference on Information Technologies and Electrical Engineering
作者: Wenjun Zhu Yan Li Wensheng Wang Jinhong Zhu Yue Wei IoT Department Beljing China-power Information Technology Co.ltd. China
In recent years, with 5G and other key technology breakthroughs, IoT technology is accelerating penetration into various industries, and the era of Internet of Everything is coming. However, while the industry is prom... 详细信息
来源: 评论
A Novel GAN based User Desensitization data Generation Algorithm  21
A Novel GAN based User Desensitization Data Generation Algor...
收藏 引用
5th International conference on Electronic Information Technology and Computer Engineering, EITCE 2021
作者: Shi, Congcong Yu, Pengfei Huang, Xiuli State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd. Jiangsu Province Nanjing China
In recent years, how to use user data rationally has become a hot topic of discussion. In order to solve the problem that existing user desensitised data generation methods lead to the unavailability of the user profi... 详细信息
来源: 评论