咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是951-960 订阅
排序:
5th International conference on Emerging Research in Computing, Information, Communication and applications, ERCICA 2018
5th International Conference on Emerging Research in Computi...
收藏 引用
5th International conference on Emerging Research in Computing, Information, Communication and applications, ERCICA 2018
the proceedings contain 56 papers. the special focus in this conference is on Emerging Research in Computing, Information, Communication and applications. the topics include: A review on feature selection algorithms;a...
来源: 评论
Securing Wireless Neurostimulators  18
Securing Wireless Neurostimulators
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Marin, Eduard Singelee, Dave Yang, Bohan Volski, Vladimir Vandenbosch, Guy A. E. Nuttin, Bart Preneell, Bart Katholieke Univ Leuven Imec COSIC Leuven Belgium Katholieke Univ Leuven ESAT TELEMIC Leuven Belgium UZ Leuven Neurosurg Leuven Belgium
Implantable medical devices (IMDs) typically rely on proprietary protocols to wirelessly communicate with external device programmers. In this paper, we fully reverse engineer the proprietary protocol between a device... 详细信息
来源: 评论
Short Text Topic Recognition and Optimization Method for University Online Community  1
收藏 引用
5th International conference on Artificial Intelligence and security, ICAIS 2019
作者: Wu, Xu Wu, Haitao Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security BUPT Beijing China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
the university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post-bar, un... 详细信息
来源: 评论
Representing cloud security and privacy policies and detecting potential problems
Representing cloud security and privacy policies and detecti...
收藏 引用
Big data Intelligence and Computing (dataCOM), International conference on
作者: Anthony Opara Youngsang Song Seong-Je Cho Lawrence Chung University of Texas at Dallas Dankook University
Cloud computing involves multiple stakeholders, each with its own security, privacy and trust requirements, where policy enforcement is shared between the various stakeholders, in contrast to on-premise computing, whe... 详细信息
来源: 评论
Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities  18
Remote Attestation for Low-End Prover Devices with Post-Quan...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Liu, Xiruo Misoczki, Rafael Sastry, Manoj R. Intel Corp Intel Labs Hillsboro OR 97124 USA
Remote attestation is a well-established interactive technique to establish trust in the realm of connected devices. It allows a Prover device to attest its platform integrity to a Verifier device. Existing remote att... 详细信息
来源: 评论
SecuPAN: A security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN  18
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based N...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Hossain, Mahmud Karim, Yasser Hasan, Ragib Univ Alabama Birmingham Dept Comp Sci SECRETLab Birmingham AL 35294 USA
6LoWPAN is a widely used protocol for communication over IPV6 Low-power Wireless Personal Area Networks. Unfortunately, the 6LoWPAN packet fragmentation mechanism possesses vulnerabilities that adversaries can exploit... 详细信息
来源: 评论
the Research of Information security for the Education Cloud Platform Based on AppScan Technology  5
The Research of Information Security for The Education Cloud...
收藏 引用
5th IEEE International conference on Cyber security and Cloud Computing (CSCloud) / 4th IEEE International conference on Edge Computing and Scalable Cloud (EdgeCom)
作者: Nie, Wei Xiao, Xiangfei Wu, Zhaohui Wu, Yuanhui Shen, Fang Luo, Xionglan Shenzhen Univ Coll Informat Engn Shenzhen 518060 Peoples R China Shenzhen Informat Secur Evaluat Ctr Shenzhen Peoples R China
For the online education,remote educationresources sharing and resource integration issues, according to the cloud computing technology,the education cloud is widely used. With the widespread use of education cloud, t... 详细信息
来源: 评论
Risk-based Service Selection in Federated Clouds  11
Risk-based Service Selection in Federated Clouds
收藏 引用
11th IEEE/acm International conference on Utility and Cloud Computing (UCC-Companion) / 5th IEEE/acm International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Ahmed, Usama Petri, Ioan Rana, Omer Raza, Imran Hussain, Syed Asad COMSATS Univ Islamabad Dept Comp Sci Lahore Campus Islamabad Pakistan Cardiff Univ Sch Engn Cardiff S Glam Wales Cardiff Univ Sch Comp Sci & Informat Cardiff S Glam Wales
the Cloud Service Provider (CSP) marketplace has continued to expand in recent years. Although a few major providers dominate (e.g. AWS, Google Cloud, Microsoft Azure), there are also a number of specialist providers ... 详细信息
来源: 评论
RICE: Remote Method Invocation in ICN  5
RICE: Remote Method Invocation in ICN
收藏 引用
5th acm conference on Information-Centric Networking (ICN)
作者: Krol, Michal Habak, Karim Oran, David Kutscher, Dirk Psaras, Ioannis UCL London England Georgia Tech Atlanta GA USA Huawei Shenzhen Peoples R China
Information Centric Networking has been proposed as a new network layer for the Internet, capable of encompassing the full range of networking facilities provided by the current IP architecture. In addition to the obv... 详细信息
来源: 评论
Biometric data transformation for cryptographic domains and its application: poster  19
Biometric data transformation for cryptographic domains and ...
收藏 引用
proceedings of the 12th conference on security and privacy in Wireless and Mobile Networks
作者: Shoukat Ali Koray Karabina Emrah Karagoz Florida Atlantic University
A large class of biometric template protection algorithms assume that feature vectors are integer valued. However, biometric data is generally represented through real-valued feature vectors. therefore, secure templat... 详细信息
来源: 评论