Conti, Mauro.
概要
作品: | 2 作品在 4 項出版品 1 種語言 |
---|
書目資訊
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I /
by:
Casalicchio, Emiliano.; Conti, Mauro.; Spognardi, Angelo.; Zhou, Jianying.; SpringerLink (Online service)
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Cryptology and Network Security = 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings /
by:
Conti, Mauro.; Krenn, Stephan.; Stevens, Marc.; SpringerLink (Online service)
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyberspace Safety and Security = 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings /
by:
SpringerLink (Online service); Conti, Mauro.; Meng, Weizhi.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security = 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II /
by:
SpringerLink (Online service); Casalicchio, Emiliano.; Spognardi, Angelo.; Zhou, Jianying.; Conti, Mauro.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Systems Security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /
by:
Kamakoti, V.; Gaur, Manoj Singh.; Ray, Indrajit.; SpringerLink (Online service); Sanghi, Dheeraj.; Conti, Mauro.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Trust and Trustworthy Computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings /
by:
Schunter, Matthias.; Askoxylakis, Ioannis.; SpringerLink (Online service); Conti, Mauro.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Trust and trustworthy computing = 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015 : proceedings /
by:
Conti, Mauro.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Askoxylakis, Ioannis.; Schunter, Matthias.
(書目-語言資料,印刷品)
Versatile Cybersecurity
by:
Somani, Gaurav.; Conti, Mauro.; SpringerLink (Online service); Poovendran, Radha.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber threat intelligence
by:
Dehghantanha, Ali.; SpringerLink (Online service); Conti, Mauro.; Dargahi, Tooska.
(書目-語言資料,印刷品)
Secure Wireless Sensor Networks = Threats and Solutions /
by:
Conti, Mauro.; SpringerLink (Online service)
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/aut]
Security and Trust Management = 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings /
by:
SpringerLink (Online service); Mauw, Sjouke.; Conti, Mauro.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Secure wireless sensor networks = threats and solutions /
by:
Conti, Mauro.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Cyber Threat Intelligence
by:
SpringerLink (Online service); Dehghantanha, Ali.; Conti, Mauro.; Dargahi, Tooska.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied Cryptography and Network Security Workshops = ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings /
by:
Ahmed, Chuadhry Mujeeb.; Losiouk, Eleonora.; Portokalidis, Georgios.; Ochoa, Martín.; Zhou, Jianying.; Conti, Mauro.; Lin, Jingqiang.; Au, Man Ho.; Li, Zhou.; Meng, Weizhi.; Zhang, Kehuan.; SpringerLink (Online service); Batina, Lejla.; Luo, Bo.; Majumdar, Suryadipta.; Picek, Stjepan.; Wang, Cong.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Versatile cybersecurity
by:
Somani, Gaurav.; Conti, Mauro.; Poovendran, Radha.; SpringerLink (Online service)
(書目-語言資料,印刷品)
更多
較少的
主題
Image Processing and Computer Vision.
Data protection.
Artificial intelligence.
Computer Communication Networks.
Software engineering.
Electrical engineering.
Algorithms.
Computer and Information Systems Applications.
Application software.
e-Commerce/e-business.
Coding theory.
Computers.
Mobile and Network Security.
Data Structures and Information Theory.
Wireless sensor networks
Algorithm Analysis and Problem Complexity.
Computer networks .
Coding and Information Theory.
Information Systems Applications (incl. Internet).
Data structures (Computer science).
Computer Science.
Management of Computing and Information Systems.
Computer communication systems.
Security.
Computer networks—Security measures.
Computing Milieux.
Computer science.
Management information systems.
Data encryption (Computer science)
E-commerce.
Computer security.
Computer organization.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Artificial Intelligence (incl. Robotics)
Artificial Intelligence.
Data encryption (Computer science).
Software Engineering/Programming and Operating Systems.
Data Encryption.
Information theory.
Communications Engineering, Networks.
Computer networks
Computers and civilization.
Computer security
Information Systems and Communication Service.
Internet
Data mining.
Computers and Society.
Cryptology.
Optical data processing.
Data and Information Security.
Cryptography.
Data Mining and Knowledge Discovery.