Wang, Cliff.
Overview
Works: | 1 works in 6 publications in 1 languages |
---|
Titles
Adaptive Autonomous Secure Cyber Systems
by:
Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; SpringerLink (Online service); Cybenko, George.; Wellman, Michael.; Subrahmanian, V.S.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense = Control- and Game-Theoretic Approaches to Cyber Security /
by:
Wellman, Michael.; Cybenko, George.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.; Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
AI embedded assurance for cyber systems
by:
Sun, Kun.; Iyengar, S. S.; Wang, Cliff.; SpringerLink (Online service)
(Language materials, printed)
Proactive and dynamic network defense
by:
Wang, Cliff.; Lu, Zhuo.; SpringerLink (Online service)
(Language materials, printed)
Cyber Warfare = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; Swarup, Vipin.; Jajodia, Sushil.; Wang, Cliff.; Shakarian, Paulo.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber Deception = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; SpringerLink (Online service); Jajodia, Sushil.; Swarup, Vipin.; Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Botnet Detection = Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
Digital Fingerprinting
by:
Kasera, Sneha Kumar.; Gerdes, Ryan M.; Guan, Yong.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Autonomous Cyber Deception = Reasoning, Adaptive Planning, and Evaluation of HoneyThings /
by:
Wang, Cliff.; SpringerLink (Online service); Hamlen, Kevin W.; Wei, Jinpeng.; Al-Shaer, Ehab.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Digital fingerprinting
by:
Wang, Cliff.; SpringerLink (Online service)
(Language materials, printed)
Proactive and Dynamic Network Defense
by:
SpringerLink (Online service); Wang, Cliff.; Lu, Zhuo.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Wang, Wenye.; Wang, Cliff.; SpringerLink (Online service); Lu, Zhou.
(Language materials, printed)
Introduction to hardware security and trust
by:
SpringerLink (Online service); Tehranipoor, Mohammad.; Wang, Cliff.
(Language materials, printed)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Wang, Cliff.; Liu, Peng.; SpringerLink (Online service)
(Language materials, printed)
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
by:
Lu, Zhou.; SpringerLink (Online service); Wang, Cliff.; Wang, Wenye.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Show more
Fewer
Subjects
Data protection.
Artificial intelligence.
Computer Communication Networks.
Electrical engineering.
Machine learning.
Telecommunication.
Information Systems Applications (incl.Internet)
Information Systems Applications (incl. Internet)
Application software.
Cooperating objects (Computer systems)
Data Structures, Cryptology and Information Theory.
Computers.
Cybercrime.
Mobile and Network Security.
Biometrics.
Algorithm Analysis and Problem Complexity.
Computer crimes
Information Systems Applications (incl. Internet).
Computer Science.
Computer communication systems.
Probability and Statistics in Computer Science.
Security.
Computer crimes.
Cyber-Physical Systems.
Computer Crime.
Computing Milieux.
Data encryption (Computer science)
Computer security.
Electronics and Microelectronics, Instrumentation.
Computer organization.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Biometrics (Biology).
Artificial Intelligence (incl. Robotics)
Artificial Intelligence.
Data encryption (Computer science).
Computational Intelligence.
Engineering.
Digital forensic science.
Processor Architectures.
Circuits and Systems.
Data Encryption.
Communications Engineering, Networks.
Computer networks
Wireless Internet
Internet
Mathematical statistics.
Information Systems and Communication Service.
Cryptology.
Computer input-output equipment
Cryptography.