咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是941-950 订阅
排序:
Secure, Consistent, and High-Performance Memory Snapshotting  18
Secure, Consistent, and High-Performance Memory Snapshotting
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Cox, Guilherme Yan, Zi Bhattacharjee, Abhishek Ganapathy, Vinod Rutgers State Univ Piscataway NJ 08854 USA Indian Inst Sci Bangalore Karnataka India
Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain su... 详细信息
来源: 评论
SPEED: Secure Provable Erasure for Class-1 IoT Devices  18
SPEED: Secure Provable Erasure for Class-1 IoT Devices
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Ammar, Mahmoud Daniels, Wilfried Crispo, Bruno Hughes, Danny Katholieke Univ Leuven Imec DistriNet Leuven Belgium Univ Trento Trento Italy
the Internet of things (IoT) consists of embedded devices that sense and manage our environment in a growing range of applications. Large-scale IoT systems such as smart cities require significant investment in both e... 详细信息
来源: 评论
Hyperagents: Migrating Host Agents to the Hypervisor  18
Hyperagents: Migrating Host Agents to the Hypervisor
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Bushouse, Micah Reeves, Douglas North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
third-party software daemons called host agents are increasingly responsible for a modern host's security, automation, and monitoring tasks. Because of their location within the host, these agents are at risk of m... 详细信息
来源: 评论
GUILeak: Tracing privacy Policy Claims on User Input data for Android applications  18
GUILeak: Tracing Privacy Policy Claims on User Input Data fo...
收藏 引用
40th acm/IEEE International conference on Software Engineering (ICSE)
作者: Wang, Xiaoyin Qin, Xue Hosseini, Mitra Bokaei Slavin, Rocky Breaux, Travis D. Niu, Jianwei Univ Texas San Antonio San Antonio TX 78249 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
the Android mobile platform supports billions of devices across more than 190 countries around the world. this popularity coupled with user data collection by Android apps has made privacy protection a well-known chal... 详细信息
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th International conference on Artificial Intelligence and security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. the method det... 详细信息
来源: 评论
CoRuM: Collaborative Runtime Monitor Framework for application security  11
CoRuM: Collaborative Runtime Monitor Framework for Applicati...
收藏 引用
11th IEEE/acm International conference on Utility and Cloud Computing (UCC-Companion) / 5th IEEE/acm International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Das, Saikat Shiva, Sajjan Univ Memphis Dept Comp Sci Memphis TN 38152 USA
We propose a framework based on Collaborative Runtime Monitors (CoRuM) for application-level security. CoRuM detects the abnormal behavior of an application by observing critical characteristics during program runtime... 详细信息
来源: 评论
Building Trustable Remote Monitoring and Management Systems  11
Building Trustable Remote Monitoring and Management Systems
收藏 引用
11th IEEE/acm International conference on Utility and Cloud Computing (UCC-Companion) / 5th IEEE/acm International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Morshedi, Maghsoud Noll, Josef Kari, Raheleh Univ Oslo Oslo Norway EyeNetworks Oslo Norway Norwegian Univ Sci & Technol Alesund Norway
Internet of things (IoT) is an emerging technology that expands wireless and mobile networks into heterogeneous network of connected devices. Trustable remote monitoring and management systems are required to establis... 详细信息
来源: 评论
Cross-App Tracking via Nearby Bluetooth Low Energy Devices  18
Cross-App Tracking via Nearby Bluetooth Low Energy Devices
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Korolova, Aleksandra Sharma, Vinod Univ Southern Calif Los Angeles CA 90007 USA
Today an increasing number of consumer devices such as head phones, wearables, light bulbs and even baseball bats, are Bluetooth-enabled thanks to the widespread support of the technology by phone manufacturers and mo... 详细信息
来源: 评论
SGX Enforcement of Use-Based privacy  17
SGX Enforcement of Use-Based Privacy
收藏 引用
17th acm Workshop on privacy in the Electronic Society (WPES)
作者: Birrell, Eleanor Gjerdrum, Anders van Renesse, Robbert Johansen, Havard Johansen, Dag Schneider, Fred B. Pomona Coll Claremont CA 91711 USA UIT Arctic Univ Norway Tromso Norway Cornell Univ Ithaca NY USA
Use-based privacy restricts how information may be used, making it well-suited for data collection and data analysis applications in networked information systems. this work investigates the feasibility of enforcing u... 详细信息
来源: 评论
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android applications  18
SCLib: A Practical and Lightweight Defense against Component...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Wu, Daoyuan Cheng, Yao Gao, Debin Li, Yingjiu Deng, Robert H. Singapore Management Univ Sch Informat Syst Singapore Singapore ASTAR Inst Infocomm Res Singapore Singapore Singapore Management Univ Singapore Singapore
Cross-app collaboration via inter-component communication is a fundamental mechanism on Android. Although it brings the benefits such as functionality reuse and data sharing, a threat called component hijacking is als... 详细信息
来源: 评论