語系:
繁體中文
English
說明(常見問題)
登入
Advances in information security
書目資訊
intrusion detection in distributed s...
intrusion detection in distributed systems
image and video encrytion
image and video encrytion
security for wireless sensor networks
security for wireless sensor networks
security in e-learning
security in e-learning
austin protocol compiler
austin protocol compiler
intrusion detection and correlation
intrusion detection and correlation
image and video encryption
image and video encryption
security in e-learning
security in e-learning
impacts and risk assessment of techn...
impacts and risk assessment of technology for internet security
botnet detection
botnet detection
vulnerability analysis and defense f...
vulnerability analysis and defense for the internet
insider attack and cyber security
insider attack and cyber security
intrusion detection systems
intrusion detection systems
security for telecommunications networks
security for telecommunications networks
preserving privacy in data outsourcing
preserving privacy in data outsourcing
moving target defense
moving target defense
spyware and adware
spyware and adware
economics of information security
economics of information security
global initiatives to secure cyberspace
global initiatives to secure cyberspace
secure multi-party non-repudiation p...
secure multi-party non-repudiation protocols and applications
secure key establishments
secure key establishments
identifying malicious code through r...
identifying malicious code through reverse engineering
primality testing and integer factor...
primality testing and integer factorization in public-key cryptography
security and dependability for ambie...
security and dependability for ambient intelligence
research developments in biometrics ...
research developments in biometrics and video processing techniques /
network science and cybersecurity
network science and cybersecurity
improving information security pract...
improving information security practices through computational intelligence /
handbook of research on threat detec...
handbook of research on threat detection and countermeasures in network security /
secure wireless sensor networks
secure wireless sensor networks
cyber denial, deception and counter ...
cyber denial, deception and counter deception
evolution of cyber technologies and ...
evolution of cyber technologies and operations to 2035
moving target defense ii
moving target defense ii
iris biometrics
iris biometrics
security management in mobile cloud ...
security management in mobile cloud computing /
security solutions for hyperconnecti...
security solutions for hyperconnectivity and the internet of things /
managing security issues and the hid...
managing security issues and the hidden dangers of wearable technologies /
online banking security measures and...
online banking security measures and data protection /
security and resiliency analytics fo...
security and resiliency analytics for smart grids
cyber-security of scada and other in...
cyber-security of scada and other industrial control systems
preserving privacy against side-chan...
preserving privacy against side-channel leaks
security breaches and threat prevent...
security breaches and threat prevention in the internet of things /
security solutions and applied crypt...
security solutions and applied cryptography in smart grid communications /
threat mitigation and detection of c...
threat mitigation and detection of cyber warfare and terrorism activities /
security, privacy, and anonymization...
security, privacy, and anonymization in social networks :
differential privacy and applications
differential privacy and applications
cyber threat intelligence
cyber threat intelligence
smart micro-grid systems security an...
smart micro-grid systems security and privacy
versatile cybersecurity
versatile cybersecurity
security and privacy issues in senso...
security and privacy issues in sensor networks and iot /
advanced digital image steganography...
advanced digital image steganography using lsb, pvd, and emd :
proactive and dynamic network defense
proactive and dynamic network defense
intrusion detection systems
intrusion detection systems
evolution of cyber technologies and ...
evolution of cyber technologies and operations to 2035
secure wireless sensor networks
secure wireless sensor networks
cyber warfare
cyber warfare
cyber denial, deception and counter ...
cyber denial, deception and counter deception
protecting privacy in data release
protecting privacy in data release
cyber-security of scada and other in...
cyber-security of scada and other industrial control systems
security and resiliency analytics fo...
security and resiliency analytics for smart grids
preserving privacy against side-chan...
preserving privacy against side-channel leaks
smart micro-grid systems security an...
smart micro-grid systems security and privacy
versatile cybersecurity
versatile cybersecurity
cyber threat intelligence
cyber threat intelligence
security and privacy issues in senso...
security and privacy issues in sensor networks and iot
malicious attack propagation and sou...
malicious attack propagation and source identification
cloud security auditing
cloud security auditing
industrial control systems security ...
industrial control systems security and resiliency
proactive and dynamic network defense
proactive and dynamic network defense
cryptography arithmetic
cryptography arithmetic
blockchain cybersecurity, trust and ...
blockchain cybersecurity, trust and privacy
cross-layer design for secure and re...
cross-layer design for secure and resilient cyber-physical systems
binary code fingerprinting for cyber...
binary code fingerprinting for cybersecurity
multivariate public key cryptosystems
multivariate public key cryptosystems
android malware detection using mach...
android malware detection using machine learning
ransomware revolution: the rise of a...
ransomware revolution: the rise of a prodigious cyber threat
fog/edge computing for security, pri...
fog/edge computing for security, privacy, and applications
new dimensions of information warfare
new dimensions of information warfare
cybersecurity awareness
artificial intelligence for cybersecurity
personal data protection and legal developments in the european union
cybersecurity capabilities in developing nations and its impact on global security
security and risk analysis for intelligent edge computing
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入