咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是821-830 订阅
排序:
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional data Anonymisation  19
Attribute Compartmentation and Greedy UCC Discovery for High...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Podlesny, Nikolai J. Kayem, Anne V. D. M. Meinel, Christoph Univ Potsdam Hasso Plattner Inst Potsdam Germany
High-dimensional data is particularly useful for data analytics research. In the healthcare domain, for instance, high-dimensional data analytics has been used successfully for drug discovery. Yet, in order to adhere ... 详细信息
来源: 评论
Behind Enemy Lines: Exploring Trusted data Stream Processing on Untrusted Systems  19
Behind Enemy Lines: Exploring Trusted Data Stream Processing...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: thoma, Cory Lee, Adam J. Labrinidis, Alexandros Univ Pittsburgh Pittsburgh PA 15260 USA
data Stream Processing Systems (DSPSs) execute long-running, continuous queries over transient streaming data, often making use of outsourced, third-party computational platforms. However, third-party outsourcing can ... 详细信息
来源: 评论
Session details: Session 5: Mobile security  20
Session details: Session 5: Mobile Security
收藏 引用
proceedings of the Tenth acm conference on data and application security and privacy
作者: Phani Vadrevu University of New Orleans
No abstract available.
来源: 评论
A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of application  1
收藏 引用
5th International conference on Information Systems security and privacy, ICISSP 2019
作者: Daoudagh, Said Lonetti, Francesca Marchetti, Eda Istituto di Scienza e Tecnologie dell’Informazione "Alessandro Faedo" CNR Pisa Italy University of Pisa Pisa Italy
Access control mechanisms aim to assure data protection in modern software systems. Testing of such mechanisms is a key activity to avoid security flaws and violations inside the systems or applications. In this paper... 详细信息
来源: 评论
Vulnerabilities in IoT Devices for Smart Home Environment  5th
Vulnerabilities in IoT Devices for Smart Home Environment
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Costa, Luis Barros, Joao Paulo Tavares, Miguel Inst Politecn Beja Beja Portugal Ctr Technol & Syst CTS UNINOVA Lisbon Portugal Inst Engn Sistemas & Comp Invest & Desenvolviment Lisbon Portugal
Recently, consumers have seen multiple products being advertised as smart home. these products promise to make our homes more comfortable, safe, automated, and remotely controlled. To this new reality of processing in... 详细信息
来源: 评论
15th International conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International conference on Harmony Search, Soft Computing and applications, ICHSA 2019
15th International Conference on Natural Computation, Fuzzy ...
收藏 引用
15th International conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International conference on Harmony Search, Soft Computing and applications, ICHSA 2019
the proceedings contain 227 papers. the special focus in this conference is on Natural Computation, Fuzzy Systems and Knowledge Discovery. the topics include: New Passive Collision Force Suppression Mechanism for Huma...
来源: 评论
Conditional privacy: Users' Perception of data privacy in Autonomous Driving  5
Conditional Privacy: Users' Perception of Data Privacy in Au...
收藏 引用
5th International conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
作者: Brell, Teresa Biermann, Hannah Philipsen, Ralf Ziefle, Martina Rhein Westfal TH Aachen Human Comp Interact Ctr Campus Blvd 57 D-52074 Aachen Germany
Connected autonomous driving can be a key for safety enhancement in road traffic and long-term reduction of driver-induced accidents with personal injury. though, its acceptance is challenging, because of perceived re... 详细信息
来源: 评论
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM  5th
Probabilistic Graphical Model on Detecting Insiders: Modelin...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Saaudi, Ahmed Tong, Yan Farkas, Csilla Univ South Carolina Dept Comp Sci & Engn 550 Assembly St Columbia SC 29208 USA
this paper presents a novel approach to detect malicious behaviors in computer systems. We propose the use of varying granularity levels to represent users' log data: Session-based, Day-based, and Week-based. A us... 详细信息
来源: 评论
Unsupervised euclidean distance attack on network embedding  5
Unsupervised euclidean distance attack on network embedding
收藏 引用
5th IEEE International conference on data Science in Cyberspace, DSC 2020
作者: Yu, Shanqing Zheng, Jun Chen, Jinyin Xuan, Qi Zhang, Qingpeng Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China City University of Hong Kong Hong Kong
Considering the wide application of network embedding methods in graph data mining, inspired by adversarial attacks in deep learning, a genetic algorithm-based Euclidean distance attack strategy is proposed to attack ... 详细信息
来源: 评论
A Systematic Approach to Choose the data Warehouse Architecture  5th
A Systematic Approach to Choose the Data Warehouse Architect...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Venditti, Antonello Fasano, Fausto Univ Molise Dept Biosci & Terr Pesche Italy
In the design phase of a data warehouse, an appropriate architecture must be selected. To this aim, the engineer assesses various alternatives, depending on the requirements of the specific context. Usually, he choose... 详细信息
来源: 评论