咨询与建议

限定检索结果

文献类型

  • 55 篇 会议
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 70 篇 计算机科学与技术...
    • 35 篇 电气工程
    • 18 篇 信息与通信工程
    • 12 篇 软件工程
    • 8 篇 网络空间安全
    • 5 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 城乡规划学
    • 1 篇 公安技术
  • 12 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 9 篇 理学
    • 4 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 88 篇 big data securit...
  • 22 篇 big data
  • 10 篇 cloud computing
  • 6 篇 big data privacy
  • 6 篇 cryptography
  • 5 篇 homomorphic encr...
  • 5 篇 privacy protecti...
  • 5 篇 mapreduce
  • 4 篇 deep learning
  • 4 篇 hadoop
  • 4 篇 security
  • 4 篇 cloud security
  • 3 篇 access control
  • 3 篇 anomaly detectio...
  • 3 篇 variational mutu...
  • 3 篇 key agreement
  • 3 篇 data encryption
  • 3 篇 cybersecurity
  • 3 篇 group key transf...
  • 3 篇 machine learning

机构

  • 3 篇 san jose state u...
  • 2 篇 grad univ adv st...
  • 2 篇 queens univ sch ...
  • 2 篇 turk telekom sec...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 turk telekom lab...
  • 2 篇 birla inst techn...
  • 2 篇 oregon state uni...
  • 1 篇 univ constantine...
  • 1 篇 khalifa univ dep...
  • 1 篇 institute of sec...
  • 1 篇 dongguan polytec...
  • 1 篇 thapar univ dept...
  • 1 篇 texas a&m univ s...
  • 1 篇 gazi univ inform...
  • 1 篇 king abdulaziz u...
  • 1 篇 natl univ comp &...
  • 1 篇 national enginee...
  • 1 篇 shanghai institu...
  • 1 篇 ucsi univ icsdi ...

作者

  • 3 篇 park younghee
  • 3 篇 gao jerry
  • 2 篇 zeydan engin
  • 2 篇 dincer cem
  • 2 篇 oguri hidenobu
  • 2 篇 alsulaimawi zahi...
  • 2 篇 zulkernine moham...
  • 2 篇 eassa fathy e.
  • 2 篇 ray soumya
  • 2 篇 kim sung-hwan
  • 2 篇 chung tai-myoung
  • 2 篇 chandra sudipta
  • 2 篇 alhazmi hanan e.
  • 2 篇 euiin choi
  • 2 篇 song chungsik
  • 2 篇 sonehara noboru
  • 2 篇 goswami r. t.
  • 1 篇 boudouda souheil...
  • 1 篇 chen hanlu
  • 1 篇 xueguo li

语言

  • 85 篇 英文
  • 1 篇 土耳其文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Big Data Security"
88 条 记 录,以下是1-10 订阅
排序:
big data security Hardening Methodology using Attributes Relationship
Big data Security Hardening Methodology using Attributes Rel...
收藏 引用
4th International Conference on Information Science and Applications (ICISA)
作者: Kim, Sung-Hwan Eom, Jung-Ho Chung, Tai-Myoung Sungkyunkwan Univ Sch Informat Commun Engn Suwon South Korea
Recently developments in network, mining and data store technology have heightened the need for big data and big data security. In this paper, we focus on the big data's characteristic which takes seriously the an... 详细信息
来源: 评论
big data security Challenges and Preventive Solutions  3rd
Big Data Security Challenges and Preventive Solutions
收藏 引用
International Conference on data Management, Analytics and Innovation (ICDMAI)
作者: Gupta, Nirmal Kumar Rohil, Mukesh Kumar Jaypee Univ Anoopshahr Dept Comp Sci & Engn Anoopshahr India Birla Inst Technol & Sci Dept Comp Sci & Informat Syst Pilani Rajasthan India
big data has opened the possibility of making great advancements in many scientific disciplines and has become a very interesting topic in academic world and in industry. It has also given contributions to innovation,... 详细信息
来源: 评论
big data security Framework Based on Encryption  4th
Big Data Security Framework Based on Encryption
收藏 引用
4th International Conference on Cloud Computing and security (ICCCS)
作者: Wu, Shaobing Wang, Changmei Yunnan Police Coll Inst Informat Secur Kunming 650223 Yunnan Peoples R China Yunnan Normal Univ Solar Energy Inst Kunming 650092 Yunnan Peoples R China
The biggest challenge for big data era from a security point of view is the protection of user's privacy and data security. big data analysis is a more complex process, especially if the data is unstructured. We m... 详细信息
来源: 评论
big data security: Requirements, Challenges and Preservation of Private data inside Mobile Operators
Big Data Security: Requirements, Challenges and Preservation...
收藏 引用
5th IEEE International Black Sea Conference on Communications and Networking (IEEE BlackSeaCom)
作者: Dincer, Cem Zeydan, Engin Turk Telekom Secur Planning & Applicat Dept Istanbul Turkey Turk Telekom Labs Istanbul Turkey
Today's mobile operators (MOs) are experiencing tremendous amount of data usage of their subscribers. This results in data tsunami arriving from various sources inside MOs' network infrastructures. On the othe... 详细信息
来源: 评论
big data security in Cloud Environment  4
Big Data Security in Cloud Environment
收藏 引用
4th IEEE International Conference on big data security on Cloud (bigdatasecurity) / 4th IEEE International Conference on High Performance and Smart Computing (HPSC) / 3rd IEEE International Conference on Intelligent data and security (IDS)
作者: Reddy, Yenumula B. Grambling State Univ Dept Comp Sci Grambling LA 71245 USA
big data conventionally coins large volume of data that continuously increases in a real-time basis and difficult to store, retrieve, and process in traditional database techniques. But it is necessary to know that bi... 详细信息
来源: 评论
big data security Survey on Frameworks and Algorithms  7
Big Data Security Survey on Frameworks and Algorithms
收藏 引用
7th IEEE International Advance Computing Conference (IACC)
作者: Chandra, Sudipta Ray, Soumya Goswami, R. T. Birla Inst Technol Kolkata Campus Kolkata India
Technology today has progressed to an extent wherein collection of data is possible for every granular aspect of a business, in real time. Electronic devices, power grids and modern software all generate huge volumes ... 详细信息
来源: 评论
big data security: A Progress Study of Current User Authentication Schemes  4
Big Data Security: A Progress Study of Current User Authenti...
收藏 引用
4th IEEE International C)onference on Applied and Theoretical Computing and Communication Technology (iCATccT
作者: Algaradi, Thoyazan Sultan Rama, B. Kakatiya Univ Dept Comp Sci Warangal Andhra Pradesh India
In the past few years, a rapid evolution in the ICTs has been witnessed in various aspects, leading to a higher communication volume, and data exchange. `big data' is one of the recent paradigms, which comes into ... 详细信息
来源: 评论
big data security in Healthcare Survey on Frameworks and Algorithms  7
Big Data Security in Healthcare Survey on Frameworks and Alg...
收藏 引用
7th IEEE International Advance Computing Conference (IACC)
作者: Chandra, Sudipta Ray, Soumya Goswami, R. T. Birla Inst Technol Kolkata Campus Kolkata India
Healthcare data is increasingly being digitized today and the data collected today coming in from all modern devices, has reached a significant volume all over the world. In the US, UK and other European countries, he... 详细信息
来源: 评论
A lattice-based efficient certificateless public key encryption for big data security in clouds
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2024年 158卷 255-266页
作者: Li, Juyan Yan, Mingyan Peng, Jialiang Huang, Haodong El-Latif, Ahmed A. Abd Heilongjiang Univ Sch Data Sci & Technol Harbin 150080 Peoples R China Prince Sultan Univ Coll Comp & Informat Sci Ctr Excellence Quantum & Intelligent Comp EIAS Data Sci Lab Riyadh 11586 Saudi Arabia Menoufia Univ Fac Sci Dept Math & Comp Sci Shibin Al Kawm 32511 Egypt
With the advancement of technology and the development of digitization, big data has become an integral component of modern society. Due to the huge volume of big data, users generally upload data to the cloud for sto... 详细信息
来源: 评论
A novel group key transfer for big data security
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2014年 249卷 436-443页
作者: Hsu, Chingfang Zeng, Bing Zhang, Maoyuan Cent China Normal Univ Comp Sch Wuhan 430079 Peoples R China S China Univ Technol Sch Software Engn Guangzhou 510006 Guangdong Peoples R China
With the rapid development of group-oriented services over big data, it needs novel solutions to ensure big data security. Most existing group key transfer protocols depend on a mutually trusted key generation center ... 详细信息
来源: 评论