咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是841-850 订阅
排序:
Representing cloud security and privacy policies and detecting potential problems  5
Representing cloud security and privacy policies and detecti...
收藏 引用
5th IEEE International conference on Big data Intelligence and Computing, dataCom 2019
作者: Opara, Anthony Song, Youngsang Cho, Seong-Je Chung, Lawrence University of Texas Dallas United States Dankook University Korea Republic of
Cloud computing involves multiple stakeholders, each with its own security, privacy and trust requirements, where policy enforcement is shared between the various stakeholders, in contrast to on-premise computing, whe... 详细信息
来源: 评论
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and application Fingerprinting  18
MagneticSpy: Exploiting Magnetometer in Mobile Devices for W...
收藏 引用
2019 Workshop on privacy in the Electronic Society
作者: Matyunin, Nikolay Wang, Yujue Arul, Tolga Kullmann, Kristian Szefer, Jakub Katzenbeisser, Stefan Tech Univ Darmstadt Darmstadt Germany CYSEC Darmstadt Germany Yale Univ New Haven CT 06520 USA Univ Passau Chair Comp Engn Passau Germany
Recent studies have shown that aggregate CPU usage and power consumption traces on smartphones can leak information about applications running on the system or websites visited. In response, access to such data has be... 详细信息
来源: 评论
Result-Based Detection of Insider threats to Relational databases  19
Result-Based Detection of Insider Threats to Relational Data...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Sallam, Asmaa Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47906 USA
Insiders misuse of resources is a real threat to organizations. According to recent security reports, data has been the most vulnerable to attacks by insiders, especially data located in databases and corporate file s... 详细信息
来源: 评论
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars  19
Dynamic Groups and Attribute-Based Access Control for Next-G...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Gupta, Maanak Benson, James Patwa, Farhan Sandhu, Ravi Univ Texas San Antonio Dept Comp Sci Inst Cyber Secur Ctr Secur & Privacy Enhanced Cloud Comp San Antonio TX 78249 USA
Smart cars are among the essential components and major drivers of future cities and connected world. the interaction among connected entities in this vehicular internet of things (IoT) domain, which also involves sma... 详细信息
来源: 评论
Risk and security practices: Experiences from the e-land project  30
Risk and security practices: Experiences from the e-land pro...
收藏 引用
30th European Safety and Reliability conference, ESREL 2020 and 15th Probabilistic Safety Assessment and Management conference, PSAM15 2020
作者: Esnoul, Coralie Olsen, Silje Arendt Gran, Bjørn Axel Gao, Xueli Jørgensen, Per-Arne Simensen, John Eidar Institute for Energy Technology Os Alle 5 Halden1777 Norway
the increasing availability of renewable energy sources and the high expectations from end-users regarding energy dependability has forced a re-thinking of how the full potential of energy supplies can be released. E-... 详细信息
来源: 评论
Future security of Smart Speaker and IoT Smart Home Devices  5
Future Security of Smart Speaker and IoT Smart Home Devices
收藏 引用
5th International conference on Mobile and Secure Services (MobiSecServ)
作者: Godwin, Shawn Glendenning, Brett Gagneja, Kanwalinderjit Florida Polytech Univ Dept Comp Sci Lakeland FL 33805 USA
the main idea in this research paper is to break the security of Echo by Amazon. Initially, we learned about how the Echo functions, and what security measures Amazon has implemented through hands-on testing and resea... 详细信息
来源: 评论
ShinyAnonymizer: A Tool for Anonymizing Health data  5
ShinyAnonymizer: A Tool for Anonymizing Health Data
收藏 引用
5th International conference on Information and Communication Technologies for Ageing Well and e-Health (ICT4AWE)
作者: Vardalachakis, Marios Kondylakis, Haridimos Koumakis, Lefteris Kouroubali, Angelina Katehakis, Dimitrios G. FORTH ICS Computat Biomed Lab Iraklion Crete Greece Technol Educ Inst Crete Dept Informat Engn Iraklion Greece FORTH ICS Ctr eHlth Applicat & Serv Iraklion Crete Greece
Processing and managing sensitive health data requires a high standard of security and privacy measures to ensure that all ethical and legal requirements are respected. data anonymization is one of the key technologie... 详细信息
来源: 评论
Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption  19
Limitless HTTP in an HTTPS World: Inferring the Semantics of...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Anderson, Blake Chi, Andrew Dunlop, Scott McGrew, David Cisco San Jose CA 95134 USA Univ N Carolina Chapel Hill NC 27515 USA
We present new analytic techniques for inferring HTTP semantics from passive observations of HTTPS that can infer the value of important fields including the status-code, Content-Type, and Server, and the presence or ... 详细信息
来源: 评论
CCSW 2019 - proceedings of the 2019 acm SIGSAC conference on Cloud Computing security Workshop
CCSW 2019 - Proceedings of the 2019 ACM SIGSAC Conference on...
收藏 引用
10th acm SIGSAC conference on Cloud Computing security Workshop, CCSW 2019, co-located with the 26th acm conference on Computer and Communications security, CCS 2019
the proceedings contain 17 papers. the topics discussed include: verifiable computation using smart contracts;secure delegation of isogeny computations and cryptographic applications;ABSTRACT: cloud-based image classi...
来源: 评论
Sensing Danger: Exploiting Sensors to Build Covert Channels  5th
Sensing Danger: Exploiting Sensors to Build Covert Channels
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Ulz, thomas Feldbacher, Markus Pieber, thomas Steger, Christian Graz Univ Technol Inst Tech Informat Graz Austria
Recent incidents have shown that sensor-equipped devices can be used by adversaries to perform malicious activities, such as spying on end-users or for industrial espionage. In this paper, we present a novel attack sc... 详细信息
来源: 评论