研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

ACM Transactions on Privacy and Security

短名ACM Trans. Priv. Secur.
Journal Impact2.82
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2)
期刊索引SCI Q4中科院 4 区
ISSN2471-2566, 2471-2574
h-index26
国内分区计算机科学(4区)计算机科学计算机信息系统(4区)

《ACM Transactions on Privacy and Security》(前身为 TISSEC)致力于发布信息和系统安全及隐私领域的高质量研究成果。我们欢迎涉及这些领域各个方面的研究,包括技术、系统与应用,以及政策制定。

期刊主页投稿网址

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统程序设计语言数学政治学法学工程类计算机网络人工智能生物哲学万维网统计经济地理算法物理历史
出版信息出版商: Association for Computing Machinery (ACM)出版周期: 期刊类型: journal
基本数据创刊年份: 2016原创研究文献占比100.00%自引率:3.30%Gold OA占比: 0.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Specifying and Verifying Information Flow Control in SELinux Configurations

2024-8-29

DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization

2024-8-29

SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements

2024-8-8

Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack

2024-8-8

Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond

2024-8-3

VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning

2024-7-20

CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models

2024-7-12

PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises

2024-7-11

ZPredict: ML-Based IPID Side-channel Measurements

2024-6-20

ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model

2024-6-17

Security Analysis of the Consumer Remote SIM Provisioning Protocol

2024-5-6

X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting

2024-5-6

Toward Robust ASR System against Audio Adversarial Examples using Agitated Logit

2024-4-26

<scp>CySecBERT</scp> : A Domain-Adapted Language Model for the Cybersecurity Domain

2024-4-8

A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation

2024-3-16

AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks

2024-3-14

MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android

2024-2-15

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection

2024-2-5

Combining Cyber Security Intelligence to Refine Automotive Cyber Threats

2024-2-5

DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models

2024-2-5

Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

2024-1-19

Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions

2024-1-18

Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain

2024-1-10

<i>OptiClass</i> : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures

2024-1-10

Non-Intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network

2023-12-29

Sphinx-in-the-Head: Group Signatures from Symmetric Primitives

2023-12-27

An Experimental Assessment of Inconsistencies in Memory Forensics

2023-12-12

<i>OptiClass</i> : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures

2023-11-22

Sound-based Two-Factor Authentication: Vulnerabilities and Redesign

2023-11-11

Eyes See Hazy while Algorithms Recognize Who You Are

2023-11-10

Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain

2023-11-8

Forward Security with Crash Recovery for Secure Logs

2023-11-3

DeepMark: A Scalable and Robust Framework for DeepFake Video Detection

2023-11-2

On Detecting and Measuring Exploitable JavaScript Functions in Real-World Applications

2023-10-26

Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems

2023-9-27

System Auditing for Real-Time Systems

2023-9-23

symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception

2023-9-20

Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism

2023-9-19

Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection

2023-9-18

Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

2023-8-17

Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies

2023-8-8

TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism

2023-8-7

SAM: Query-efficient Adversarial Attacks against Graph Neural Networks

2023-7-28

A Vulnerability Assessment Framework for Privacy-preserving Record Linkage

2023-6-27

<scp>B</scp> <sup>3</sup> : Backdoor Attacks against Black-box Machine Learning Models

2023-6-22

Defending Against Membership Inference Attacks on Beacon Services

2023-6-7

Costs and Benefits of Authentication Advice

2023-5-13

Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

2023-4-24

Resilience-by-design in Adaptive Multi-agent Traffic Control Systems

2023-4-17

SoK: Human-centered Phishing Susceptibility

2023-4-14

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司