咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是831-840 订阅
排序:
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering  5th
Solving a Hard Instance of Suspicious Behaviour Detection wi...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Filiol, Eric Hota, Abhilash ESIEA Lab Virol & Cryptol Operat Laval France
In this article we present a study dealing with the problem of detecting a very small subset of suspicious and malicious behaviours represented by sparse binary vectors in a population of individuals significantly lar... 详细信息
来源: 评论
Deep Neural Networks Classification over Encrypted data  19
Deep Neural Networks Classification over Encrypted Data
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Hesamifard, Ehsan Takabi, Hassan Ghasemi, Mehdi Univ North Texas Denton TX 76203 USA Univ Saskatchewan Saskatoon SK Canada
Deep Neural Networks (DNNs) have overtaken classic machine learning algorithms due to their superior performance in big data analysis in a broad range of applications. On the other hand, in recent years Machine Learni... 详细信息
来源: 评论
A Novel Features Set for Internet Traffic Classification using Burstiness  5th
A Novel Features Set for Internet Traffic Classification usi...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Oudah, Hussein Ghita, Bogdan Bakhshi, Taimur Plymouth Univ Ctr Secur Commun & Network Res Plymouth Devon England
Traffic classification is an essential tool for network management and security. Traditional techniques such as port-based and payload analysis are ineffective as major Internet applications use dynamic port numbers a... 详细信息
来源: 评论
SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain  5th
SPROOF: A Platform for Issuing and Verifying Documents in a ...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Brunner, Clemens Knirsch, Fabian Engel, Dominik Salzburg Univ Appl Sci Ctr Secure Energy Informat Puch Bei Hallein Austria
Managing educational certificates or records of personal achievements often comes at the cost of handling documents, loss of data or malicious counterfeits. Especially in the case of printed certificates, both the ori... 详细信息
来源: 评论
proceedings - 5th IEEE International conference on Big data security on Cloud, Bigdatasecurity 2019, 5th IEEE International conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International conference on Intelligent data and security, IDS 2019
Proceedings - 5th IEEE International Conference on Big Data ...
收藏 引用
5th IEEE International conference on Big data security on Cloud, 5th IEEE International conference on High Performance and Smart Computing and 4th IEEE International conference on Intelligent data and security, Bigdatasecurity/HPSC/IDS 2019
the proceedings contain 55 papers. the topics discussed include: an analysis of differential privacy research in location data;speech emotion recognition based on multi-task learning;high performance data encryption w...
来源: 评论
Are You Ready When It Counts? IT Consulting Firm's Information security Incident Management  5th
Are You Ready When It Counts? IT Consulting Firm's Informati...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Nyman, Maja Grosse, Christine Mid Sweden Univ Dept Informat Syst & Technol Holmgatan 10 Sundsvall Sweden
Information security incidents are increasing both in number and in scope. In consequence, the General data Protection Regulation and the Directive on security of network and information systems force organisations to... 详细信息
来源: 评论
Mobile Devices as Digital Sextants for Zero-Permission Geolocation  5th
Mobile Devices as Digital Sextants for Zero-Permission Geolo...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Schwittmann, Lorenz Wander, Matthaeus Weis, Torben Univ Duisburg Essen Distributed Syst Grp D-47048 Duisburg Germany
Sensors in mobile devices can be used to infer information about a user's context, most notably the location. Android apps and websites shown in Firefox for Android allow software to read the ambient light sensor,... 详细信息
来源: 评论
privacy and security analysis of cryptocurrency mobile applications  5
Privacy and Security analysis of cryptocurrency mobile appli...
收藏 引用
5th International conference on Mobile and Secure Services (MobiSecServ)
作者: Sai, Ashish Rajendra Buckley, Jim Le Gear, Andrew Univ Limerick Lero Limerick Ireland Univ Limerick Nexus Ctr Horizon Globex Ireland DAC Limerick Ireland
Subsequent to the introduction of Bitcoin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these cryptocurrencies. With a perceived ... 详细信息
来源: 评论
A Study of data Store-based Home Automation  19
A Study of Data Store-based Home Automation
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Kafle, Kaushal Moran, Kevin Manandhar, Sunil Nadkarni, Adwait Poshyvanyk, Denys William & Mary Williamsburg VA 23185 USA
Home automation platforms provide a new level of convenience by enabling consumers to automate various aspects of physical objects in their homes. While the convenience is beneficial, security flaws in the platforms o... 详细信息
来源: 评论
Representing cloud security and privacy policies and detecting potential problems  5
Representing cloud security and privacy policies and detecti...
收藏 引用
5th IEEE International conference on Big data Intelligence and Computing, dataCom 2019
作者: Opara, Anthony Song, Youngsang Cho, Seong-Je Chung, Lawrence University of Texas Dallas United States Dankook University Korea Republic of
Cloud computing involves multiple stakeholders, each with its own security, privacy and trust requirements, where policy enforcement is shared between the various stakeholders, in contrast to on-premise computing, whe... 详细信息
来源: 评论