Wang, Cliff.
Overview
Works: | 1 works in 6 publications in 1 languages |
---|
Titles
Adaptive Autonomous Secure Cyber Systems
by:
Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; SpringerLink (Online service); Cybenko, George.; Wellman, Michael.; Subrahmanian, V.S.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
AI embedded assurance for cyber systems
by:
Sun, Kun.; Iyengar, S. S.; Wang, Cliff.; SpringerLink (Online service)
(Language materials, printed)
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense = Control- and Game-Theoretic Approaches to Cyber Security /
by:
Wellman, Michael.; Cybenko, George.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.; Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Proactive and dynamic network defense
by:
Wang, Cliff.; Lu, Zhuo.; SpringerLink (Online service)
(Language materials, printed)
Cyber Warfare = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; Shakarian, Paulo.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber Deception = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; SpringerLink (Online service); Jajodia, Sushil.; Swarup, Vipin.; Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Botnet Detection = Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
Digital Fingerprinting
by:
Kasera, Sneha Kumar.; Gerdes, Ryan M.; Guan, Yong.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Autonomous Cyber Deception = Reasoning, Adaptive Planning, and Evaluation of HoneyThings /
by:
Wang, Cliff.; SpringerLink (Online service); Hamlen, Kevin W.; Wei, Jinpeng.; Al-Shaer, Ehab.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Digital fingerprinting
by:
Wang, Cliff.; SpringerLink (Online service)
(Language materials, printed)
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Wang, Wenye.; Wang, Cliff.; SpringerLink (Online service); Lu, Zhou.
(Language materials, printed)
Proactive and Dynamic Network Defense
by:
SpringerLink (Online service); Wang, Cliff.; Lu, Zhuo.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Introduction to hardware security and trust
by:
SpringerLink (Online service); Tehranipoor, Mohammad.; Wang, Cliff.
(Language materials, printed)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Wang, Cliff.; Liu, Peng.; SpringerLink (Online service)
(Language materials, printed)
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
by:
Lu, Zhou.; SpringerLink (Online service); Wang, Cliff.; Wang, Wenye.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Show more
Fewer
Subjects
Electronics and Microelectronics, Instrumentation.
Computer organization.
Systems and Data Security.
Data protection.
Artificial intelligence.
Computer Communication Networks.
Electrical engineering.
Machine learning.
Computer Systems Organization and Communication Networks.
Telecommunication.
Information Systems Applications (incl.Internet)
Information Systems Applications (incl. Internet)
Biometrics (Biology).
Artificial Intelligence (incl. Robotics)
Application software.
Artificial Intelligence.
Computer crimes.
Cooperating objects (Computer systems)
Data Structures, Cryptology and Information Theory.
Cryptology.
Data encryption (Computer science).
Computational Intelligence.
Cyber-Physical Systems.
Computer Crime.
Engineering.
Computing Milieux.
Computers.
Cybercrime.
Digital forensic science.
Computer input-output equipment
Data encryption (Computer science)
Computer security.
Processor Architectures.
Cryptography.
Mobile and Network Security.
Circuits and Systems.
Biometrics.
Algorithm Analysis and Problem Complexity.
Data Encryption.
Computer crimes
Communications Engineering, Networks.
Computer networks
Information Systems Applications (incl. Internet).
Wireless Internet
Computer Science.
Computer communication systems.
Probability and Statistics in Computer Science.
Security.
Internet
Mathematical statistics.
Information Systems and Communication Service.