Wang, Cliff.
概要
作品: | 1 作品在 6 項出版品 1 種語言 |
---|
書目資訊
Adaptive Autonomous Secure Cyber Systems
by:
Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; SpringerLink (Online service); Cybenko, George.; Wellman, Michael.; Subrahmanian, V.S.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense = Control- and Game-Theoretic Approaches to Cyber Security /
by:
Wellman, Michael.; Cybenko, George.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.; Wang, Cliff.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
AI embedded assurance for cyber systems
by:
Sun, Kun.; Iyengar, S. S.; Wang, Cliff.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Proactive and dynamic network defense
by:
Wang, Cliff.; Lu, Zhuo.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Cyber Warfare = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; Shakarian, Paulo.; SpringerLink (Online service)
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber Deception = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; SpringerLink (Online service); Jajodia, Sushil.; Swarup, Vipin.; Wang, Cliff.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Botnet Detection = Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; SpringerLink (Online service); Wang, Cliff.
(書目-語言資料,印刷品)
Digital Fingerprinting
by:
Kasera, Sneha Kumar.; Gerdes, Ryan M.; Guan, Yong.; SpringerLink (Online service); Wang, Cliff.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Autonomous Cyber Deception = Reasoning, Adaptive Planning, and Evaluation of HoneyThings /
by:
Wang, Cliff.; SpringerLink (Online service); Hamlen, Kevin W.; Wei, Jinpeng.; Al-Shaer, Ehab.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Proactive and Dynamic Network Defense
by:
SpringerLink (Online service); Wang, Cliff.; Lu, Zhuo.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Wang, Wenye.; Wang, Cliff.; SpringerLink (Online service); Lu, Zhou.
(書目-語言資料,印刷品)
Introduction to hardware security and trust
by:
SpringerLink (Online service); Tehranipoor, Mohammad.; Wang, Cliff.
(書目-語言資料,印刷品)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Wang, Cliff.; Liu, Peng.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
by:
Lu, Zhou.; SpringerLink (Online service); Wang, Cliff.; Wang, Wenye.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/aut]
更多
較少的
主題
Data protection.
Artificial intelligence.
Computer Communication Networks.
Electrical engineering.
Machine learning.
Telecommunication.
Information Systems Applications (incl.Internet)
Information Systems Applications (incl. Internet)
Application software.
Cooperating objects (Computer systems)
Data Structures, Cryptology and Information Theory.
Computers.
Cybercrime.
Mobile and Network Security.
Biometrics.
Algorithm Analysis and Problem Complexity.
Computer crimes
Information Systems Applications (incl. Internet).
Computer Science.
Computer communication systems.
Probability and Statistics in Computer Science.
Security.
Computer crimes.
Cyber-Physical Systems.
Computer Crime.
Computing Milieux.
Data encryption (Computer science)
Computer security.
Electronics and Microelectronics, Instrumentation.
Computer organization.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Biometrics (Biology).
Artificial Intelligence (incl. Robotics)
Artificial Intelligence.
Data encryption (Computer science).
Computational Intelligence.
Engineering.
Digital forensic science.
Processor Architectures.
Circuits and Systems.
Data Encryption.
Communications Engineering, Networks.
Computer networks
Wireless Internet
Internet
Mathematical statistics.
Information Systems and Communication Service.
Cryptology.
Computer input-output equipment
Cryptography.