咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是981-990 订阅
排序:
Poster: Indirect cyber attacks by perturbation of environment control: A data driven attack model  5
Poster: Indirect cyber attacks by perturbation of environmen...
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
作者: Chung, Keywhan Kalbarczyk, Zbigniew T. Iyer, Ravishankar K. University of Illinois Urbana-Champaign United States
When the security of computing infrastructure has been considered, the focus has traditionally been on the infrastructure itself with less thought given to the surrounding systems that affect the operation of the infr... 详细信息
来源: 评论
POSTER: CipherLocker: Encrypted File Sharing with Ranked Search https://***  25
POSTER: CipherLocker: Encrypted File Sharing with Ranked Sea...
收藏 引用
25th acm conference on Computer and Communications security, CCS 2018
作者: Kasiak, Jan Carbunar, Bogdan Christensen, Jake Lyukova, Maria Bajaj, Sumeet Boruta, Mike Sion, Radu Popescu, Viorel Sorodoc, Alex Stan, Gabriel Private Machines Inc BrooklynNY United States Privacy Systems SRL Bucharest Romania
Today's (predominantly cloud-based) file sharing products leave users at the mercy of providers and nation-state adversaries with subpoena and National security Letter (NSL) powers. In-Transit and provider-side at... 详细信息
来源: 评论
acm International conference Proceeding Series
ACM International Conference Proceeding Series
收藏 引用
13th International conference on Availability, Reliability and security, ARES 2018
the proceedings contain 129 papers. the topics discussed include: influence factors on the quality of user experience in OS reliability: a qualitative experimental study;finally Johnny can encrypt. but does this make ...
来源: 评论
Secure Fine-Grained data Access Control Over Multiple Cloud Server Based Healthcare applications
Secure Fine-Grained Data Access Control Over Multiple Cloud ...
收藏 引用
International conference on Computing Communication Control and Automation (ICCUBEA)
作者: Nilam Manikrao Deshmukh Santosh Kumar Rakesh Shirsath Computer Engineering Department Sandip Institute of Technology and Research Centre (SPPU) Nashik India
With the flourishing build out of the cloud computing, privacy and security worries of outsourcing data have been increasing to a great extent. Mobile cloud model aids for analyzing the information related with patien...
来源: 评论
security Requirements in Intelligent Transportation System: A systematic review
Security Requirements in Intelligent Transportation System: ...
收藏 引用
International conference on Computing Communication Control and Automation (ICCUBEA)
作者: Mini Sharma Dept. of computer science and engg. State Institute of Rural Development Ranchi Jharkhand India
Cars in modern life have become the most essential elements and with increase in the number of cars nowadays, many problems arise such as pollution, traffic jams, etc. Intelligent Transportation System (ITS) provides ...
来源: 评论
Game theory meets network security a tutorial  18
Game theory meets network security a tutorial
收藏 引用
25th acm conference on Computer and Communications security, CCS 2018
作者: Zhu, Quanyan Rass, Stefan New York University BrooklynNY United States Universitaet Klagenfurt Klagenfurt Austria
the increasingly pervasive connectivity of today’s information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiali... 详细信息
来源: 评论
A Survey on the New Development of Medical Image security Algorithms  4th
A Survey on the New Development of Medical Image Security Al...
收藏 引用
4th International conference on Cloud Computing and security (ICCCS)
作者: Tan, Yun Qin, Jiaohua Tan, Ling Tang, Hao Xiang, Xuyu Cent South Univ Forestry & Technol Changsha 410004 Hunan Peoples R China Cent S Univ Xiangya Hosp 2 Changsha 410011 Hunan Peoples R China
With the development of big data, cloud computing and artificial intelligence, smart healthcare based on Internet plus has become a highly attractive application area. Medical image storage and analysis are progressiv... 详细信息
来源: 评论
Poster: Investigating tensorflow for airport facial identification  5
Poster: Investigating tensorflow for airport facial identifi...
收藏 引用
5th Annual Symposium and Bootcamp on Hot Topics in the Science of security, HoTSoS 2018
作者: Shopov, Nikolay Jeong, Mingu Rude, Evin Neseralla, Brennan Hutchison, Scott Mentis, Alexander Matthews, Suzanne J. Department of Electrical Engineering and Computer Science West PointNY United States
Facial recognition is a rapidly developing application of machine learning. Face identification is specifically being adopted across security systems such as airports, perimeter security, and law-enforcement. In this ... 详细信息
来源: 评论
Secure Authentication Protocol for 5G Enabled IoT Network  5
Secure Authentication Protocol for 5G Enabled IoT Network
收藏 引用
5th IEEE International conference on Parallel, Distributed and Grid Computing (PDGC)
作者: Sharma, Suraj Satapathy, Shaswat Singh, Shivani Sahu, Amiya Kumar Obaidat, Mohammad S. Saxena, Sanjay Puthal, Deepak Int Inst Informat Technol Bhubaneswar India Nazarbayev Univ ECE Dept Astana Kazakhstan Univ Jordan King Abdullah II Sch IT Amman Jordan USTB Beijing Peoples R China Univ Technol Sydney Sydney NSW Australia
the rapid growth of Internet of things(IoT) along with wide range of applications made IoT popular. Moreover,the network connectivity and communication support is provided by 5G technology. the mobile technology is al... 详细信息
来源: 评论
5th International conference on Future data and security Engineering, FDSE 2018
5th International Conference on Future Data and Security Eng...
收藏 引用
5th International conference on Future data and security Engineering, FDSE 2018
the proceedings contain 38 papers. the special focus in this conference is on Future data and security Engineering. the topics include: A secure and efficient kNN classification algorithm using encrypted index search ...
来源: 评论