咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是971-980 订阅
排序:
A study on Blockchain enabled applications and its security Issues
A study on Blockchain enabled Applications and its Security ...
收藏 引用
International conference for Convergence of Technology (I2CT)
作者: Nilima D. Pai Shaheen Mondal Mukesh Patel School of Technology Management and Engineering NMIMS India
Blockchain technology was first established because of its use in cryptocurrencies, but its applications are not limited just to this field. We have explored other fields like Finance, Auditing, Digital identity, Digi... 详细信息
来源: 评论
privacy-preserving personal health record (P3HR): A secure android application  18
Privacy-preserving personal health record (P3HR): A secure a...
收藏 引用
7th International conference on Software and Information Engineering, ICSIE 2018
作者: Samet, Saeed Ishraque, Mohd Tazim Sharma, Anupam School of Computer Science Faculty of Science University of Windsor WindsorON Canada
In contrast to the Electronic Medical Record (EMR) and Electronic Health Record (EHR) systems that are created to maintain and manage patient data by health professionals and organizations, Personal Health Record (PHR... 详细信息
来源: 评论
the effectiveness of data augmentation for detection of gastrointestinal diseases from endoscopical images  5
The effectiveness of data augmentation for detection of gast...
收藏 引用
5th International conference on Bioimaging, BIOIMAGING 2018 - Part of 11th International Joint conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2018
作者: Asperti, Andrea Mastronardo, Claudio University of Bologna Mura Anteo Zamboni 7 Bologna40127 Italy
the lack, due to privacy concerns, of large public databases of medical pathologies is a well-known and major problem, substantially hindering the application of deep learning techniques in this field. In this article... 详细信息
来源: 评论
Cloud Challenge: Secure End-to-End Processing of Smart Metering data  11
Cloud Challenge: Secure End-to-End Processing of Smart Meter...
收藏 引用
11th IEEE/acm International conference on Utility and Cloud Computing (UCC-Companion) / 5th IEEE/acm International conference on Big data Computing, applications and Technologies (BDCAT)
作者: Brito, Andrey Fetzer, Christof Kopsell, Stefan Pietzuch, Peter Pasin, Marcelo Felber, Pascal Fonseca, Keiko Rosa, Marcelo Gomes-, Luiz, Jr. Riella, Rodrigo Prado, Charles da Costa Carmo, Luiz F. C. Lucani, Daniel E. Sipos, Marton Nagy, Laszlo Feher, Marcell Univ Fed Campina Grande Campina Grande Brazil Tech Univ Dresden Dresden Germany Imperial Coll London London England UNINE Neuchatel Switzerland UTFPR Curitiba Parana Brazil LACTEC Curitiba Parana Brazil INMETRO Rio De Janeiro Brazil Chocolate Cloud ApS Aalborg Denmark
Cloud computing considerably reduces the costs of deploying applications through on-demand, automated, and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and se... 详细信息
来源: 评论
An Approach to Enhancing Confidentiality and Integrity on Mobile Multi-Cloud Systems: the "ARIANNA" Experience  5
An Approach to Enhancing Confidentiality and Integrity on Mo...
收藏 引用
5th International conference on Internet of things: Systems, Management and security (IoTSMS)
作者: Di Pietro, Riccardo Scarpa, Marco Giacobbe, Maurizio Puliafito, Antonio CIAM Piazza Pugliatti 1 I-98100 Messina Italy Univ Messina Dept Engn Messina Italy
Technology evolution is addressing the industry to face some formidable challenges, such as ensuring the security of mobile devices. By the union between Cloud technologies and mobile devices, the new concept of "... 详细信息
来源: 评论
security VULNERABILITIES IN ANDROID applicationS  16
SECURITY VULNERABILITIES IN ANDROID APPLICATIONS
收藏 引用
16th Australian Information security Management conference, AISMC 2018
作者: Montealegre, Crischell Njuguna, Charles Rubia Malik, Muhammad Imran Hannay, Peter McAteer, Ian Noel School of Science Edith Cowan University Australia Asterisk Information Security Perth Australia
privacy-related vulnerabilities and risks are often embedded into applications during their development, with this action being either performed out of malice or out of negligence. Moreover, the majority of the mobile... 详细信息
来源: 评论
proceedings - 5th IEEE International conference on Cyber security and Cloud Computing and 4th IEEE International conference on Edge Computing and Scalable Cloud, CSCloud/EdgeCom 2018
Proceedings - 5th IEEE International Conference on Cyber Sec...
收藏 引用
5th IEEE International conference on Cyber security and Cloud Computing and 4th IEEE International conference on Edge Computing and Scalable Cloud, CSCloud/EdgeCom 2018
the proceedings contain 38 papers. the topics discussed include: a system for exploratory analysis in cloud;privacy-preserving and unforgeable searchable encrypted audit logs for cloud storage;a real-time sensor netwo...
来源: 评论
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of things  18
Access Control Model for Virtual Objects (Shadows) Communica...
收藏 引用
8th acm conference on data and application security and privacy (CODASPY)
作者: Alshehri, Asma Benson, James Patwa, Farhan Sandhu, Ravi Univ Texas San Antonio C SPECC San Antonio TX 78249 USA Univ Texas San Antonio Dept Comp Sci San Antonio TX USA Univ Texas San Antonio San Antonio TX USA
the concept of Internet of things (IoT) has received considerable attention and development in recent years. there have been significant studies on access control models for IoT in academia, while companies have alrea... 详细信息
来源: 评论
acm International conference Proceeding Series
ACM International Conference Proceeding Series
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
the proceedings contain 26 papers. the topics discussed include: robustness of deep autoencoder in intrusion detection under adversarial contamination;understanding the challenges to adoption of the microsoft elevatio...
来源: 评论
Poster: Indirect cyber attacks by perturbation of environment control: A data driven attack model  5
Poster: Indirect cyber attacks by perturbation of environmen...
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
作者: Chung, Keywhan Kalbarczyk, Zbigniew T. Iyer, Ravishankar K. University of Illinois Urbana-Champaign United States
When the security of computing infrastructure has been considered, the focus has traditionally been on the infrastructure itself with less thought given to the surrounding systems that affect the operation of the infr... 详细信息
来源: 评论