IEEE Security & Privacy最新文献

筛选
英文 中文
IEEE Computing Edge IEEE 边缘计算
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369441
{"title":"IEEE Computing Edge","authors":"","doi":"10.1109/msec.2024.3369441","DOIUrl":"https://doi.org/10.1109/msec.2024.3369441","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"49 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Pervasive Computing - Call for Articles IEEE 普适计算 - 征稿启事
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369438
{"title":"IEEE Pervasive Computing - Call for Articles","authors":"","doi":"10.1109/msec.2024.3369438","DOIUrl":"https://doi.org/10.1109/msec.2024.3369438","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"138 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Graphics and Applications IEEE 计算机图形学与应用
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369434
{"title":"IEEE Computer Graphics and Applications","authors":"","doi":"10.1109/msec.2024.3369434","DOIUrl":"https://doi.org/10.1109/msec.2024.3369434","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"9 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Big Data IEEE 大数据论文集
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369436
{"title":"IEEE Transactions on Big Data","authors":"","doi":"10.1109/msec.2024.3369436","DOIUrl":"https://doi.org/10.1109/msec.2024.3369436","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"273 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Reliability Society 电气和电子工程师学会可靠性协会
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3359797
{"title":"IEEE Reliability Society","authors":"","doi":"10.1109/msec.2024.3359797","DOIUrl":"https://doi.org/10.1109/msec.2024.3359797","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"275 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Computer Society Has You Covered! IEEE 计算机协会为您提供服务!
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369439
{"title":"IEEE Computer Society Has You Covered!","authors":"","doi":"10.1109/msec.2024.3369439","DOIUrl":"https://doi.org/10.1109/msec.2024.3369439","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"16 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing in Science & Engineering 科学与工程中的计算
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369435
{"title":"Computing in Science & Engineering","authors":"","doi":"10.1109/msec.2024.3369435","DOIUrl":"https://doi.org/10.1109/msec.2024.3369435","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"51 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Annals of the History of Computing 电气和电子工程师学会计算机史年鉴
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3369428
{"title":"IEEE Annals of the History of Computing","authors":"","doi":"10.1109/msec.2024.3369428","DOIUrl":"https://doi.org/10.1109/msec.2024.3369428","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"12 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side-Channel Attacks: A Short Tour 侧信道攻击短途旅行
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-04-02 DOI: 10.1109/msec.2024.3352848
Frank Piessens, Paul C. van Oorschot
{"title":"Side-Channel Attacks: A Short Tour","authors":"Frank Piessens, Paul C. van Oorschot","doi":"10.1109/msec.2024.3352848","DOIUrl":"https://doi.org/10.1109/msec.2024.3352848","url":null,"abstract":"We provide a brief, accessible introduction to side-channel attacks, a growing subarea of computer security. We explain the key underlying ideas, give a chronological overview of selected classical attacks, and characterize side-channel attacks along several axes.","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"44 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140580269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepfake Detection in Super-Recognizers and Police Officers 超级识别器和警官的深度伪造检测
IF 1.9 4区 计算机科学
IEEE Security & Privacy Pub Date : 2024-03-26 DOI: 10.1109/msec.2024.3371030
Meike Ramon, Matthew Vowels, Matthew Groh
{"title":"Deepfake Detection in Super-Recognizers and Police Officers","authors":"Meike Ramon, Matthew Vowels, Matthew Groh","doi":"10.1109/msec.2024.3371030","DOIUrl":"https://doi.org/10.1109/msec.2024.3371030","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"30 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140315222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信