咨询与建议

限定检索结果

文献类型

  • 578 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 579 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 438 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 113 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 27 篇 电气工程
    • 14 篇 控制科学与工程
    • 10 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
  • 117 篇 理学
    • 107 篇 数学
    • 9 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 4 篇 物理学
  • 39 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 61 篇 privacy
  • 46 篇 security
  • 28 篇 data privacy
  • 22 篇 machine learning
  • 21 篇 access control
  • 21 篇 differential pri...
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 blockchain
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 cryptography
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 data mining
  • 7 篇 web security
  • 7 篇 network security

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 570 篇 英文
  • 7 篇 其他
  • 2 篇 中文
检索条件"任意字段=Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"
579 条 记 录,以下是521-530 订阅
排序:
Old, new, borrowed, blue - A perspective on the evolution of mobile platform security architectures  11
Old, new, borrowed, blue - A perspective on the evolution of...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Kostiainen, Kari Reshetova, Elena Ekberg, Jan-Erik Asokan, N. Nokia Research Center Finland
The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research. From the perspective of a security researcher the noteworthy attributes of a mod... 详细信息
来源: 评论
privacy-preserving activity scheduling on mobile devices  11
Privacy-preserving activity scheduling on mobile devices
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Bilogrevic, Igor Jadliwala, Murtuza Hubaux, Jean-Pierre Aad, Imad Niemi, Valtteri EPFL CH-1015 Lausanne Switzerland Nokia Research Center CH-1015 Lausanne Switzerland
Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users' personal schedules. Users also access popular context-based services, typically provided by thi... 详细信息
来源: 评论
LeakProber: A framework for profiling sensitive data leakage paths  11
LeakProber: A framework for profiling sensitive data leakage...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Yu, Junfeng Zhang, Shengzhi Liu, Peng Li, ZhiTang College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China College of Information Sciences and Technology Pennsylvania State University University Park United States
In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path... 详细信息
来源: 评论
Crowdroid: Behavior-based malware detection system for android
Crowdroid: Behavior-based malware detection system for andro...
收藏 引用
1st acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM'11, Held in Association with the 18th acm conference on Computer and Communications security, CCS 2011
作者: Burguera, Iker Zurutuza, Urko Nadjm-Tehrani, Simin Electronics and Computing Department Mondragon University 20500 Mondragon Spain Dept. of Computer and Information Science Linköping University SE-581 83 Linköping Sweden
The sharp increase in the number of smartphones on the market, with the Android platform posed to becoming a market leader makes the need for malware analysis on this platform an urgent issue. In this paper we capital... 详细信息
来源: 评论
Non-interactive editable signatures for assured data provenance  11
Non-interactive editable signatures for assured data provena...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Qian, Haifeng Xu, Shouhuai Department of Computer Science East China Normal University China Department of Computer Science University of Texas San Antonio United States
In order to make people truly benefit from data sharing, we need technical solutions to assuring the trustworthiness of data received from parties one may not have encountered in the past. Assured data provenance is a... 详细信息
来源: 评论
Modeling location-based profiles of social image media using explorative pattern mining
Modeling location-based profiles of social image media using...
收藏 引用
2011 IEEE International conference on privacy, security, Risk and Trust, PASSAT 2011 and 2011 IEEE International conference on Social Computing, SocialCom 2011
作者: Lemmerich, Florian Atzmueller, Martin Artificial Intelligence and Applied Computer Science University of Würzburg 97074 Ẅurzburg Germany Knowledge and Data Engineering Group University of Kassel 34121 Kassel Germany
This paper presents an approach for modeling location-based profiles of social image media based on tagging information and collaborative geo-reference annotations. We utilize pattern mining techniques for obtaining s... 详细信息
来源: 评论
The optimization of situational awareness for insider threat detection  11
The optimization of situational awareness for insider threat...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Brancik, Kenneth Ghinita, Gabriel Northrop Grumman Corporation 7575 Colshire Drive McLean VA 22102 United States Purdue University W. Lafayette IN 47907 United States
In recent years, organizations ranging from defense and other government institutions to commercial enterprises, research labs, etc., have witnessed an increasing amount of sophisticated insider attacks that manage to... 详细信息
来源: 评论
Analyzing inter-application communication in Android  11
Analyzing inter-application communication in Android
收藏 引用
proceedings of the 9th international conference on Mobile systems, applications, and services
作者: Chin, Erika Felt, Adrienne Porter Greenwood, Kate Wagner, David University of California Berkeley Berkeley CA United States
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message pa... 详细信息
来源: 评论
seventh International Workshop on Software Engineering for Secure Systems (SESS 2011)  11
Seventh International Workshop on Software Engineering for S...
收藏 引用
33rd International conference on Software Engineering (ICSE)
作者: Lee, Seok-Won Monga, Mattia Juerjens, Jan Univ Nebraska Dept Comp Sci & Engn Lincoln NE 68588 USA Univ Studi Milano Dipartimento Informat Commun I-201345 Milan Italy Tech Univ Dortmund Dept Comp Sci D-44221 Dortmund Germany
The 7th edition of the SESS workshop aims at providing a venue for software engineers and security researchers to exchange ideas and techniques. In fact, software is at core of most of the business transactions and it... 详细信息
来源: 评论
System architecture for collaborative security and privacy monitoring in multi-domain networks
System architecture for collaborative security and privacy m...
收藏 引用
2011 IEEE 5th International conference on Internet Multimedia Systems Architecture and application, IMSAA 2011
作者: Rao, Sathya Bianchi, Giuseppe Garcia-Alfaro, Joaquin Romero, Francisco Trammell, Brian Berger, Andreas Lioudakis, Georgios Papagianakopoulou, Eugenia Koukovini, Mariza Mittig, Karel KYOS Switzerland CNIT Italy Institut Telecom France TID Spain ETHZ Switzerland FTW Austria ICCS Greece France Telecom France
The System architecture presented in this paper is developed in DEMONS project of the European FP7 framework project to realize the trustworthy multi-domain network with collaborative and decentralized security and pr... 详细信息
来源: 评论