咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是761-770 订阅
排序:
A blockchain solution based on directed acyclic graph for IoT data security using IoTA Tangle  5
A blockchain solution based on directed acyclic graph for Io...
收藏 引用
5th International conference on Communication and Electronics Systems, ICCES 2020
作者: Bhandary, Mohan Parmar, Manish Ambawade, Dayanand Mumbai India
the growth of the Internet of things (IoT) has recently seen an exponentially rise with the number of IoT devices been connectedincreasing in billions, but with such rapid demand and growth, IoT still faces few issues... 详细信息
来源: 评论
18th Workshop on privacy in the Electronic Society (WPES 2019)  19
18th Workshop on Privacy in the Electronic Society (WPES 201...
收藏 引用
acm SIGSAC conference on Computer and Communications security (CCS)
作者: Domingo-Ferrer, Josep Univ Rovira & Virgili Tarragona Spain
the 18th Workshop on privacy in the Electronic Society (WPES 2019) was held on November 11th, 2019, in conjunction with the 26th acm conference on Computer and Communications security (CCS 2019) in London, United King... 详细信息
来源: 评论
Achieve thumbnail Preserving Encryption by Sum Preserving Approaches for Images  20
Achieve Thumbnail Preserving Encryption by Sum Preserving Ap...
收藏 引用
6th International conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International conference on Knowledge Engineering and applications, ICKEA 2020
作者: Yang, Cheng-Hsing Weng, Chi-Yao Yang, Yu-Zhen Lee, Jung-San Huang, Cheng-Ta Department of Computer Science National Pingtung University Pingtung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Information Management Oriental Institute of Technology Taiwan
A large number of images are generated and uploaded to the cloud, due to the rapid development of IT and networking technologies. To prevent unauthorized access, image encryption is a way that can ensure the safety of... 详细信息
来源: 评论
Hybrid MQTT-COAP Protocol for data Communication in Internet of things
Hybrid MQTT-COAP Protocol for Data Communication in Internet...
收藏 引用
5th International conference on Computing, Communication and security (ICCCS)
作者: Nwankwo, Emmanuel, I Onwuka, Elizabeth N. David, Michael Suleiman, Zubair Fed Univ Technol Sch Elect Engn & Technol Dept Telecommun Engn Minna Niger State Nigeria
Wireless Sensor Networks (WSNs) consist mainly of resource constrained sensor nodes and gateways. therefore, various lightweight communication protocols are emerging for Machine to Machine (M2M) communications. Among ... 详细信息
来源: 评论
proceedings of the 5th International conference on Communication and Electronics Systems, ICCES 2020
Proceedings of the 5th International Conference on Communica...
收藏 引用
5th International conference on Communication and Electronics Systems, ICCES 2020
the proceedings contain 251 papers. the topics discussed include: honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security;face recognition system using machine learning algorithm;pre...
来源: 评论
CODASPY 2016 - proceedings of the 6th acm conference on data and application security and privacy
CODASPY 2016 - Proceedings of the 6th ACM Conference on Data...
收藏 引用
6th acm conference on data and application security and privacy, CODASPY 2016
the proceedings contain 38 papers. the topics discussed include: building privacy-preserving cryptographic credentials from federated online identities;Neuralyzer: flexible expiration times for the revocation of onlin...
来源: 评论
Investigation of Mobile Machine Learning Models to Preserve the Effectiveness of User privacy  5
Investigation of Mobile Machine Learning Models to Preserve ...
收藏 引用
5th IEEE International conference on Innovative Technologies in Intelligent Systems and Industrial applications, CITISIA 2020
作者: Motahari, Danial Arif, Samrah Mohboubi, Arash Rehman, Sabih Ur Charles Sturt University School of Computing and Mathematics Australia
Machine Learning (ML) has become one of the dominant technologies in the research world. It is being applied without exception in every field where automation and future predictions are required such as cyber security... 详细信息
来源: 评论
Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures  5
Decepti-SCADA: A Framework for Actively Defending Networked ...
收藏 引用
5th International conference on Internet of things, Big data and security (IoTBDS)
作者: Cifranic, Nicholas Romero-Mariona, Jose Souza, Brian Hallman, Roger A. Naval Informat Warfare Ctr Pacific San Diego CA 92152 USA Dartmouth Coll Thayer Sch Engn Hanover NH 03755 USA
Supervisory Control and data Acquisition (SCADA) networks, which enable virtual components of critical infrastructures to connect to physical components, like the electrical grid, for example, are susceptible to cyber... 详细信息
来源: 评论
security analysis of a swarm of drones resisting attacks by intruders  5
Security analysis of a swarm of drones resisting attacks by ...
收藏 引用
5th International Scientific and Practical conference "Distance Learning Technologies", DLT 2020
作者: Dovgal, Vitaly A. Dovgal, Dmitry V. Maykop State Technological University Maykop Russia Don State Technical University Rostov-on-Don Russia
Currently, to perform a certain task (for example, a search operation), unmanned aerial vehicles have been combined into an organized group, which can be called a swarm. Naturally, such an information system is of int... 详细信息
来源: 评论
the application of blockchain technology in the early warning and monitoring of infectious diseases  5
The application of blockchain technology in the early warnin...
收藏 引用
5th International conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)
作者: Tian Yu Yu Wan-jun Zhang Miao Zhang Min Tang Jun-yi Shanghai Inst Technol SIT Shanghai Peoples R China
In order to improve the efficiency of emergency management and decision-making and command of infectious diseases, infectious disease early warning technologies and systems can be used to monitor the trend of abnormal... 详细信息
来源: 评论