咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是931-940 订阅
排序:
security Analysis of Relationship-Based Access Control Policies  18
Security Analysis of Relationship-Based Access Control Polic...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Relationship-based access control (ReBAC) policies can express intricate protection requirements in terms of relationships among users and resources (which can be modeled as a graph). Such policies are useful in domai... 详细信息
来源: 评论
5th International conference on Artificial Intelligence and security, ICAIS 2019
5th International Conference on Artificial Intelligence and ...
收藏 引用
5th International conference on Artificial Intelligence and security, ICAIS 2019
the proceedings contain 229 papers. the special focus in this conference is on Artificial Intelligence and security. the topics include: Design of an IoT-based efficient security scheme in home wireless system;discuss...
来源: 评论
the application of blockchain technology in the early warning and monitoring of infectious diseases
The application of blockchain technology in the early warnin...
收藏 引用
International conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)
作者: Yu Tian YU Wan-Jun Miao Zhang Min Zhang Jun-Yi Tang Shanghai Institute of Technology SIT Shanghai China
In order to improve the efficiency of emergency management and decision-making and command of infectious diseases, infectious disease early warning technologies and systems can be used to monitor the trend of abnormal... 详细信息
来源: 评论
AEON: Android Encryption based Obfuscation  18
AEON: Android Encryption based Obfuscation
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Geethanjali, D. Ying, Tan Li Melissa, Chua Wan Jun Balachandran, Vivek Singapore Inst Technol Singapore Singapore Def Sci & Technol Agcy Singapore Singapore
Android applications are vulnerable to reverse engineering which could result in tampering and repackaging of applications. Even though there are many off the shelf obfuscation tools that hardens Android applications,... 详细信息
来源: 评论
NDNoT: A Framework for Named data Network of things  5
NDNoT: A Framework for Named Data Network of Things
收藏 引用
5th acm conference on Information-Centric Networking (ICN)
作者: Zhang, Zhiyi Lu, Edward Li, Yanbiao Zhang, Lixia Yu, Tianyuan Pesavento, Davide Shi, Junxiao Benmohamed, Lotfi Univ Calif Los Angeles Los Angeles CA 90024 USA Sichuan Univ Chengdu Sichuan Peoples R China NIST Gaithersburg MD 20899 USA
the Named data Networking (NDN) architecture provides simple solutions to the communication needs of Internet of things (IoT) in terms of ease-of-use, security, and content delivery. To utilize the desirable propertie... 详细信息
来源: 评论
NDNizing Existing applications: Research Issues and Experiences  5
NDNizing Existing Applications: Research Issues and Experien...
收藏 引用
5th acm conference on Information-Centric Networking (ICN)
作者: Liang, Teng Pan, Ju Zhang, Beichuan Univ Arizona Tucson AZ 85721 USA
A major challenge to potential ICN/NDN deployment is the requirement of application support, namely, applications need to be rewritten or modified in order to run on NDN networks and receive the full benefits. Using a... 详细信息
来源: 评论
SmartProvenance: A Distributed, Blockchain Based data Provenance System  18
SmartProvenance: A Distributed, Blockchain Based Data Proven...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Ramachandran, Aravind Kantarcioglu, Murat Univ Texas Dallas Richardson TX 75083 USA
Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although the blockchain t... 详细信息
来源: 评论
5th Euro-China conference on Intelligent data Analysis and applications, ECC 2018
5th Euro-China Conference on Intelligent Data Analysis and A...
收藏 引用
5th Euro-China conference on Intelligent data Analysis and applications, ECC 2018
the proceedings contain 94 papers. the special focus in this conference is on Intelligent data Analysis and applications. the topics include: Chaotic time series prediction method based on BP neural network and extend...
来源: 评论
Joint Service Pricing and Cooperative Relay Communication for Federated Learning  12
Joint Service Pricing and Cooperative Relay Communication fo...
收藏 引用
IEEE Int Congr on Cybermat / 12th IEEE Int Conf on Cyber, Phys and Social Comp (CPSCom) / 15th IEEE Int Conf on Green Computing and Communications (GreenCom) / 12th IEEE Int Conf on Internet of things (ithings) / 5th IEEE Int Conf on Smart data
作者: Feng, Shaohan Niyato, Dusit Wang, Ping Kim, Dong In Liang, Ying-Chang Nanyang Technol Univ Sch Comp Engn Singapore Singapore York Univ Dept Elect Engn & Comp Sci N York ON Canada Sungkyunkwan Univ Sch Informat & Commun Engn Seoul South Korea Univ Elect Sci & Technol China CINC Chengdu Sichuan Peoples R China
For the sake of protecting data privacy and due to the rapid development of mobile devices, e.g., powerful central processing unit (CPU) and nascent neural processing unit (NM), collaborative machine learning on mobil... 详细信息
来源: 评论
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective  5
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navi...
收藏 引用
5th International conference on Software security and Assurance, ICSSA 2019
作者: Kieseberg, Peter Schrittwieser, Sebastian Fruhwirt, Peter Weippl, Edgar Institute of IT Security Research St. Pölten UAS Josef Ressel Center BLOCKCHAINS St. Pölten Austria Vienna University of Technology Vienna Austria SBA Research and University of Vienna Vienna Austria
In this paper we analyze the structure and generation of InnoDB-indices, as well as navigation in this internal structures with respect to its application in digital forensics. We thus provide an overview on the inter... 详细信息
来源: 评论