咨询与建议

限定检索结果

文献类型

  • 555 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 418 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 552 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"
556 条 记 录,以下是551-560 订阅
排序:
acm International conference Proceeding Series - proceedings of the Second Symposium on Usable privacy and security, SOUPS 2006
ACM International Conference Proceeding Series - Proceedings...
收藏 引用
2nd Symposium on Usable privacy and security, SOUPS 2006
The proceedings contain 14 papers. The topics discussed include: aligning usability and security: a usability study of polaris;an empirical study of natural language parsing of privacy policy rules using the SPARCLE p... 详细信息
来源: 评论
Dynamic layer-2 VPN services for improving security in the Grid environment
收藏 引用
International conference on Emerging Trends in Information and Communication security
作者: Palmieri, Francesco Univ Naples Federico II Ctr Servizi Didatt Sci I-80126 Naples Italy
Pervasive and on-demand computing are now a reality, mainly in the scientific area, and the computational Grid concept is gaining popularity as a scalable way to deliver access to a wide range of distributed computing... 详细信息
来源: 评论
applications of secure electronic voting to automated privacy-preserving troubleshooting  05
Applications of secure electronic voting to automated privac...
收藏 引用
CCS 2005 - 12th acm conference on Computer and Communications security
作者: Huang, Qiang Jao, David Wang, Helen J. Princeton University United States Microsoft Research
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. This application poses interesting challen... 详细信息
来源: 评论
Generation of synthetic data sets for evaluating the accuracy of knowledge discovery systems
Generation of synthetic data sets for evaluating the accurac...
收藏 引用
KDD-2005: 11th acm SIGKDD International conference on Knowledge Discovery and data Mining
作者: Jeske, Daniel R. Samadi, Behrokh Lin, Pengyue J. Ye, Lan Cox, Sean Xiao, Rui Younglove, Ted Ly, Minh Holt, Douglas Rich, Ryan University of California Department of Statistics Riverside CA 92521 Lucent Technologies Bell Laboratories Holmdel NJ 07733 University of California Riverside CA
Information Discovery and Analysis Systems (IDAS) are designed to correlate multiple sources of data and use data mining techniques to identify potential significant events. application domains for IDAS are numerous a... 详细信息
来源: 评论
privacy and security in library RFID issues, practices, and architectures
Privacy and security in library RFID issues, practices, and ...
收藏 引用
proceedings of the 11th acm conference on Computer and Communications security, CCS 2004
作者: Molnar, David Wagner, David
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID;... 详细信息
来源: 评论
data base management  75
Data base management
收藏 引用
1975 National Computer conference AFIPS 1975
作者: Codd, E.F. IBM Research Laboratory San JoseCA United States
data base management is in a state of ferment due to the emergence within the past few years of many new requirements. Amongst these requirements are the need to make application programs and terminal activities much ...
来源: 评论