咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是791-800 订阅
排序:
Fuzzy Logic Decision based Collaborative privacy Management Framework for Online Social Networks  5th
Fuzzy Logic Decision based Collaborative Privacy Management ...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Akkuzu, Gulsum Aziz, Benjamin Adda, Mo Univ Portsmouth Sch Comp Portsmouth Hants England
Online Social Networks (OSNs) have become one of the most popular implement for interacting with people all over the world and sharing data with them. these data sometimes may be a co-owned data which involves multipl... 详细信息
来源: 评论
License Plate Detection Using Bayesian Method Based on Edge Features
License Plate Detection Using Bayesian Method Based on Edge ...
收藏 引用
Cryptography, security and privacy (CSP), IEEE International conference on
作者: Xinyun Yan Chishe Wang Dahui Hao Min Chen College of Computer Science and Information Hohai University Nanjing China School of Networks and Tele-Communications Engineering Jinling Institute of Technology Nanjing China College of Computer Science and Engineering Anhui University of Science and Technology Huainan China
Due to the complexity and variability of lighting conditions, weather conditions, and the location relationship between vehicles and cameras, the license plate detection in complex scenes has an important application ... 详细信息
来源: 评论
Tracking data Trajectories in IoT  5th
Tracking Data Trajectories in IoT
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Bodei, Chiara Galletta, Letterio Univ Pisa Dipartimento Informat Pisa Italy IMT Inst Adv Studies Lucca Lucca Italy
the Internet of things (IoT) devices access and process large amounts of data. Some of them are sensitive and can become a target for security attacks. As a consequence, it is crucial being able to trace data and to i... 详细信息
来源: 评论
Methodology of a Network Simulation in the Context of an Evaluation: application to an IDS  5
Methodology of a Network Simulation in the Context of an Eva...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Bajan, Pierre-Marie Kiennert, Christophe Debar, Herve IRT SystemX Palaiseau France Telecom SudParis Orsay France
this paper presents a methodology for the evaluation of network services security and the security of protection products. this type of evaluation is an important activity, considering the ever-increasing number of se... 详细信息
来源: 评论
Research and application of Blockchain Technology in Transportation Administrative Law Enforcement
Research and Application of Blockchain Technology in Transpo...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering conference (ITOEC)
作者: Luo Wanhua China Acad Transportat Sci Room 810Off Bldg 110 Hepingli East St Beijing Peoples R China
According to the overall goal of rule the society by law, combined with specific requirements such as the records of the entire process of law enforcement in the three systems, the information such as law enforcement ... 详细信息
来源: 评论
Towards Aligning GDPR Compliance with Software Development: A Research Agenda  5th
Towards Aligning GDPR Compliance with Software Development: ...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Jensen, Meiko Kapila, Sahil Gruschka, Nils Kiel Univ Appl Sci Kiel Germany Univ Oslo Oslo Norway
the General data Protection Regulation (GDPR) caused several new legal requirements software systems in Europe have to comply to. Support for these requirements given by proprietary software systems is limited. Here, ... 详细信息
来源: 评论
Analysis of Digital Wallet for Higher Education Student using Online Transportation Network Services  5
Analysis of Digital Wallet for Higher Education Student usin...
收藏 引用
5th International conference on Information Management and Technology (ICIMTech)
作者: Chandra, Yakob Utama Meyliana Jhonsons, Michael Bina Nusantara Univ Sch Informat Syst Informat Syst Dept Jakarta 11480 Indonesia
Online transportation networks are currently a popular choice of transportation. the customer is an online transportation network that uses a mobile application and uses a digital wallet of the online transportation n... 详细信息
来源: 评论
2019 5th International conference on Energy Equipment Science and Engineering
2019 5th International Conference on Energy Equipment Scienc...
收藏 引用
2019 5th International conference on Energy Equipment Science and Engineering, ICEESE 2019
the proceedings contain 99 papers. the topics discussed include: verification of security measures for smart substations based on visualized simulation;establishment and application of sand prediction model based on M...
来源: 评论
DPoSB: Delegated Proof of Stake with node's behavior and Borda Count  5
DPoSB: Delegated Proof of Stake with node's behavior and Bor...
收藏 引用
IEEE 5th Information Technology and Mechatronics Engineering conference (ITOEC)
作者: Tan, Chao Xiong, Liang Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing Peoples R China Mobile Internet Data Applicat Engn Technol Res Ct Chongqing Peoples R China
Blockchain was known by Satoshi Nakamoto in 2008 because of Bitcoin. After more than a decade of development, blockchain has been widely used in medical, digital finance, and electronic evidence, etc. Consensus algori... 详细信息
来源: 评论
privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious data Mining  5th
Privacy Preservation of Social Network Users Against Attribu...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Reza, Khondker Jahid Islam, Md Zahidul Estivill-Castro, Vladimir Charles Sturt Univ Sch Comp & Math Panorama Ave Bathurst NSW 2795 Australia Univ Pompeu Fabra Dept Tecnol Informacio & Comunicac Roc Boronat 138 Barcelona 08018 Spain
Online social networks (OSNs) are currently a popular platform for social interactions among people. Usually, OSN users upload various contents including personal information on their profiles. the ability to infer us... 详细信息
来源: 评论