工学 >>> 安全科学技术 >>> 安全科学技术基础学科 安全学 安全工程 职业卫生工程 安全管理工程 安全科学技术其他学科
搜索结果: 1-15 共查到安全科学技术 IT Security相关记录15条 . 查询时间(0.12 秒)
哈尔滨工程大学计算机科学与技术学院泛在网络与信息安全团队师生的研究论文《Anchor Link Prediction for Cross-Network Digital Forensics from Local and Global Perspectives》日前被网络与信息安全领域顶级期刊IEEE Transactions on Information Forensics and Securit...
由天津师范大学心理学部杨海波教授(通讯作者)和博士生杜宇菲(第一作者)共同撰写的论文“The influence of subjective value on mobile payment security warnings: An eye movement study”在Displays发表。该论文得到国家自然科学基金项目(32271140)的资助支持。
Members of a CERN board were recently targeted by so-called “CEO fraud”, following the same format as the incident that occurred at the end of 2020. CEO fraud is a social engineering method to extract...
第31届国际信息安全顶级会议USENIX SECURITY将于2022年8月在美国波士顿举行,南开大学网络空间安全学院刘哲理教授带领的数据安全团队的论文“Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes”被会议全文录用。USENIX Sec...
Surveillance cameras have an identity problem, fueled by an inherent tension between utility and privacy. As these powerful little devices have cropped up seemingly everywhere, the use of machine lear...
第九届中国信息安全博士论坛(2016China Information Security Doctor Conference,CISDC2016)将于2016年8月在吉林举办。论坛由教育部高等学校信息安全专业教学指导委员会指导,中国信息安全博士网主办,北京艾得威尔信息咨询中心承办。
What information is beaming from your mobile phone over various computer networks this very second without you being aware of it? Experts say your contact lists, email messages, surfed webpages, brow...
Following President Obama’s September 10 speech to the nation proposing a strategic response to the Islamic State in Iraq and Syria (ISIS/ISIL), several Belfer Center for Science and International Aff...
Bangladesh Institute of Peace and Security Studies (BIPSS) is a leading institution in Bangladesh for informed analysis on all aspects of broad spectrum of peace and security studies in the region and...
The Consortium of Non-Traditional Security Studies in Asia (NTS-Asia) marks the 3rd phase of the Ford-RSIS Project on Non-Traditional Security Issues. The project is funded by the Ford Foundation, an...
A multiple objective problem formulation and solution methodology is presented to select optimal information and data storage configurations considering both data survivability and data security, as w...
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of i...
Information assurance and security has become an important research issue in the networked and distributed information sharing environments. Finding effective ways to protect information systems, netw...
The e-commerce gives work and the life of people to bring the new commerce moment with facilitating, but also is being faced with jumbo challenge. Because an important technology characteristic of e-c...
March 1, 2007,Two new publications issued by the National Institute of Standards and Technology (NIST) will help senior executives, auditors and others in federal agencies better understand how to man...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...