咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是861-870 订阅
排序:
Extracting Secrets from Encrypted Virtual Machines  19
Extracting Secrets from Encrypted Virtual Machines
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Morbitzer, Mathias Huber, Manuel Horsch, Julian Fraunhofer AISEC Garching Germany
AMD SEV is a hardware extension for main memory encryption on multi-tenant systems. SEV uses an on-chip coprocessor, the AMD Secure Processor, to transparently encrypt virtual machine memory with individual, ephemeral... 详细信息
来源: 评论
Understanding the Responsiveness of Mobile App Developers to Software Library Updates  19
Understanding the Responsiveness of Mobile App Developers to...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Yasumatsu, Tatsuhiko Watanabe, Takuya Kanei, Fumihiro Shioji, Eitaro Akiyama, Mitsuaki Mori, Tatsuya Waseda Univ Tokyo Japan NTT Secure Platform Labs Tokyo Japan RIKEN AIP Tokyo Japan
this paper reports a longitudinal measurement study aiming to understand how mobile app developers are responsive to updates of software libraries over time. To quantify their responsiveness to library updates, we col... 详细信息
来源: 评论
the Influence of Users privacy and Discomfort on Using Healthcare Information System  19
The Influence of Users Privacy and Discomfort on Using Healt...
收藏 引用
5th International conference on e-Society, e-Learning and e-Technologies (ICSLT)
作者: Saad, Alsaleh Saudi Minist Hlth Hail Hlth Directory Riyadh Saudi Arabia
Ensuring the user comfort and privacy in the Healthcare Information System (HIS) plays essential roles to accept and use any of HISs. this proposal aims to explore and examine the influence of users privacy and discom... 详细信息
来源: 评论
the Design of Smart Cashless Transaction  2020
The Design of Smart Cashless Transaction
收藏 引用
5th International conference on Intelligent Information Technology, ICIIT 2020
作者: Fernando, Anthony Bryan Shreevasta Desprianto, Ferry Gaol, Ford Lumban Oktavia, Tanty Mobile Application and Technology-School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Program-Doctor of Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Department-School of Information Systems Bina Nusantara University Jakarta Indonesia
Cashless Transaction describes as a state where financial transactions are not bound by physical form such as banknotes or coins, but rather trough transfer of digital information (electronic representation of money).... 详细信息
来源: 评论
security Requirements in Intelligent Transportation System: A systematic review  5
Security Requirements in Intelligent Transportation System: ...
收藏 引用
5th International conference on Computing, Communication Control and Automation (ICCUBEA)
作者: Sharma, Mini State Inst Rural Dev Dept Comp Sci & Engn Ranchi Jharkhand India
Cars in modern life have become the most essential elements and with increase in the number of cars nowadays, many problems arise such as pollution, traffic jams, etc. Intelligent Transportation System (ITS) provides ... 详细信息
来源: 评论
A Practical Intel SGX Setting for Linux Containers in the Cloud  19
A Practical Intel SGX Setting for Linux Containers in the Cl...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Tian, Dave (Jing) Choi, Joseph, I Hernandez, Grant Traynor, Patrick Butler, Kevin R. B. Univ Florida Gainesville FL 32611 USA
With close to native performance, Linux containers are becoming the de facto platform for cloud computing. While various solutions have been proposed to secure applications and containers in the cloud environment by l... 详细信息
来源: 评论
Identification and Extraction of Digital Forensic Evidence from Multimedia data Sources using Multi-algorithmic Fusion  5th
Identification and Extraction of Digital Forensic Evidence f...
收藏 引用
5th International conference on Information Systems security and privacy (ICISSP)
作者: Mashhadani, Shahlaa Clarke, Nathan Li, F. Plymouth Univ Ctr Secur Commun & Network Res Plymouth Devon England Coll Educ Pure Sci Comp Sci Dept Baghdad Iraq Edith Cowan Univ Secur Res Inst Perth WA Australia Univ Portsmouth Sch Comp Portsmouth Hants England
With the enormous increase in the use and volume of photographs and videos, multimedia-based digital evidence has come to play an increasingly fundamental role in criminal investigations. However, given the increase i... 详细信息
来源: 评论
Blockchain-based privacy-preserving authentication and message dissemination scheme for VANET  5
Blockchain-based privacy-preserving authentication and messa...
收藏 引用
5th International conference on Systems, Control and Communications, ICSCC 2019
作者: Guehguih, Bachira Lu, Hongwei School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430047 China
the vehicular ad hoc network (VANET) is an intelligent transportation system application that aims to ensure the security of road traffic information over V2V communication and V2I communication. In this paper, we pro... 详细信息
来源: 评论
2nd International Workshop on Information and Operational Technology (IT and OT) security systems, IOSec 2019, the 1st International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the 1st International Workshop on security for Financial Critical Infrastructures and Services, FINSEC 2019, held in conjunction with the 24th European Symposium on Research in Computer security, ESORICS 2019
2nd International Workshop on Information and Operational Te...
收藏 引用
2nd International Workshop on Information and Operational Technology (IT and OT) security systems, IOSec 2019, the 1st International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the 1st International Workshop on security for Financial Critical Infrastructures and Services, FINSEC 2019, held in conjunction with the 24th European Symposium on Research in Computer security, ESORICS 2019
the proceedings contain 18 papers. the special focus in this conference is on Information and Operational Technology (IT and OT) security systems. the topics include: Finsec 2019 preface;a Comprehensive Technical Surv...
来源: 评论
ICCAI 2019 - 2019 5th International conference on Computing and Artificial Intelligence
ICCAI 2019 - 2019 5th International Conference on Computing ...
收藏 引用
5th International conference on Computing and Artificial Intelligence, ICCAI 2019
the proceedings contain 46 papers. the topics discussed include: popularity prediction for artists based on user songs dataset;assessing CSU students’ academic performance on iLearn portal using data analytics;charac...
来源: 评论