咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是921-930 订阅
排序:
privacy-aware data Assessment of Online Social Network Registration Processes  18
Privacy-aware Data Assessment of Online Social Network Regis...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Schuppler, Christine Leitner, Maria Rinderle-Ma, Stefanie AIT Austrian Inst Technol Ctr Digital Safety & Secur Vienna Austria Univ Vienna Fac Comp Sci Vienna Austria
privacy and security research has been very active concerning online social networks (OSN) as a vast amount of personal information is used and published (by users) within OSNs. However, most people do not pay attenti... 详细信息
来源: 评论
Capacity: an Abstract Model of Control over Personal data  18
<i>Capacity</i>: an Abstract Model of Control over Personal ...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Le Metayer, Daniel Rauzy, Pablo Univ Lyon INRIA Lyon France Univ Paris 08 LIASD St Denis France INRIA Le Chesnay France
While the control of individuals over their personal data is increasingly seen as an essential component of their privacy, the word "control" is usually used in a very vague way, both by lawyers and by compu... 详细信息
来源: 评论
Secured Cloud Computing Outsourcing: A Case Study of Constrained Linear Least Square Problem  5
Secured Cloud Computing Outsourcing: A Case Study of Constra...
收藏 引用
5th International conference on Networking, Systems and security (NSysS)
作者: Islam, Torikul Ferdush, Jannatul Hashem, M. M. A. Jessore Univ Sci & Technol Dept Comp Sci & Engn Jessore Bangladesh Khulna Univ Engn & Technol Dept Comp Sci & Engn Khulna Bangladesh
Cloud computing helps resource constraint customer to outsource their computations. this committed computing illustration inevitably brings in new privacy anxiety and contravention, just like input/output security and... 详细信息
来源: 评论
proceedings of the 2019 IEEE conference on Network Softwarization: Unleashing the Power of Network Softwarization, NetSoft 2019
Proceedings of the 2019 IEEE Conference on Network Softwariz...
收藏 引用
5th IEEE conference on Network Softwarization, NetSoft 2019
the proceedings contain 80 papers. the topics discussed include: a deep learning approach to VNF resource prediction using correlation between VNFs;QoE-aware real-time multimedia streaming in SD-WANs;a TOSCA-oriented ...
来源: 评论
A Low Energy Profile: Analysing Characteristic security on BLE Peripherals  18
A Low Energy Profile: Analysing Characteristic Security on B...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Sivakumaran, Pallavi Alis, Jorge Blasco Royal Holloway Univ London Ctr Doctoral Training Cyber Secur London England Royal Holloway Univ London Informat Secur Grp London England
Bluetooth Low Energy is a ubiquitous technology, with applications in the fitness, healthcare and smart home sectors, to name but a few. In this paper, we present an open-source Profiler for classifying the protection... 详细信息
来源: 评论
privacy-Preserving Certification of Sustainability Metrics  18
Privacy-Preserving Certification of Sustainability Metrics
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Sahin, Cetin Kuczenski, Brandon Egecioglu, Omer El Abbadi, Amr Univ Calif Santa Barbara Santa Barbara CA 93106 USA
Companies are often motivated to evaluate their environmental sustainability, and to make public pronouncements about their performance with respect to quantitative sustainability metrics. Public trust in these declar... 详细信息
来源: 评论
Comprehensive survey on hadoop security  1
收藏 引用
5th International conference on Emerging Research in Computing, Information, Communication and applications, ERCICA 2018
作者: Martis, Maria Pai, Namratha V. Pragathi, R.S. Rakshatha, S. Dixit, Sunanda Department of ISE Dayananda Sagar College of Engineering Bangalore560078 India
the new emerging technologies have provided a way for a large amount of data generation. Secure storage of such a huge data is of prime importance. Hadoop is a tool used to store big data, where security of it is not ... 详细信息
来源: 评论
Misusing Sensory Channel to Attack Industrial Control Systems  18
Misusing Sensory Channel to Attack Industrial Control System...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Rasapour, Farhad Mehrpouyan, Hoda Boise State Univ Dept Comp Sci Coll Engn Boise ID 83725 USA
Industrial control systems (ICS) are used to control and manage critical infrastructures and protecting these complex system and their interfaces, which can be exploited by internal and external attackers, are a vital... 详细信息
来源: 评论
Towards a Secure and GDPR-compliant Fog-to-Cloud Platform  11
Towards a Secure and GDPR-compliant Fog-to-Cloud Platform
收藏 引用
11th IEEE/acm International conference on Utility and Cloud Computing (UCC-Companion) / 5th IEEE/acm International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Crompton, Shirley Jensen, Jens UKRI Sci & Technol Facil Council Daresbury Lab Dept Comp Sci Data Sci & Technol Grp Daresbury England UKRI Sci & Technol Facil Council Rutherford Appleton Lab Dept Comp Sci Data Sci & Technol Grp Chilton England
the mF2C project is building an open, secure and decentralized management platform for coordinating resource sharing between connected devices in the fog-to-cloud (F2C) environment. Safeguarding information security a... 详细信息
来源: 评论
Model Checking of security Properties in Industrial Control Systems (ICS)  18
Model Checking of Security Properties in Industrial Control ...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Shrestha, Roshan Mehrpouyan, Hoda Xu, Dianxiang Boise State Univ Dept Comp Sci Boise ID 83725 USA
With the increasing inter-connection of operation technology to the IT network, the security threat to the Industrial Control System (ICS) is increasing daily. therefore, it is critical to utilize formal verification ... 详细信息
来源: 评论