研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
ACM Transactions on Privacy and Security
短名 | ACM Trans. Priv. Secur. |
Journal Impact | 2.82 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2) |
期刊索引 | SCI Q4中科院 4 区 |
ISSN | 2471-2566, 2471-2574 |
h-index | 26 |
国内分区 | 计算机科学(4区)计算机科学计算机信息系统(4区) |
《ACM Transactions on Privacy and Security》(前身为 TISSEC)致力于发布信息和系统安全及隐私领域的高质量研究成果。我们欢迎涉及这些领域各个方面的研究,包括技术、系统与应用,以及政策制定。
期刊主页投稿网址阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统程序设计语言数学政治学法学工程类计算机网络人工智能生物哲学万维网统计经济地理算法物理历史 |
出版信息 | 出版商: Association for Computing Machinery (ACM),出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2016,原创研究文献占比: 100.00%,自引率:3.30%, Gold OA占比: 0.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Specifying and Verifying Information Flow Control in SELinux Configurations
2024-8-29
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization
2024-8-29
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements
2024-8-8
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack
2024-8-8
Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond
2024-8-3
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning
2024-7-20
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models
2024-7-12
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises
2024-7-11
ZPredict: ML-Based IPID Side-channel Measurements
2024-6-20
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model
2024-6-17
Security Analysis of the Consumer Remote SIM Provisioning Protocol
2024-5-6
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting
2024-5-6
Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit
2024-4-26
<scp>CySecBERT</scp> : A Domain-Adapted Language Model for the Cybersecurity Domain
2024-4-8
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation
2024-3-16
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks
2024-3-14
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android
2024-2-15
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection
2024-2-5
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
2024-2-5
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models
2024-2-5
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs
2024-1-19
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
2024-1-18
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain
2024-1-10
<i>OptiClass</i> : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures
2024-1-10
Non-Intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network
2023-12-29
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
2023-12-27
An Experimental Assessment of Inconsistencies in Memory Forensics
2023-12-12
<i>OptiClass</i> : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures
2023-11-22
Sound-based Two-Factor Authentication: Vulnerabilities and Redesign
2023-11-11
Eyes See Hazy while Algorithms Recognize Who You Are
2023-11-10
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain
2023-11-8
Forward Security with Crash Recovery for Secure Logs
2023-11-3
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection
2023-11-2
On Detecting and Measuring Exploitable JavaScript Functions in Real-World Applications
2023-10-26
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems
2023-9-27
System Auditing for Real-Time Systems
2023-9-23
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception
2023-9-20
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism
2023-9-19
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection
2023-9-18
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting
2023-8-17
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies
2023-8-8
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism
2023-8-7
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks
2023-7-28
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage
2023-6-27
<scp>B</scp> <sup>3</sup> : Backdoor Attacks against Black-box Machine Learning Models
2023-6-22
Defending Against Membership Inference Attacks on Beacon Services
2023-6-7
Costs and Benefits of Authentication Advice
2023-5-13
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks
2023-4-24
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems
2023-4-17
SoK: Human-centered Phishing Susceptibility
2023-4-14
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远