Susilo, Willy.
Overview
Works: | 1 works in 6 publications in 1 languages |
---|
Titles
Provable Security = 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /
by:
Kim, Jongkil.; Susilo, Willy.; Baek, Joonsang.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyberspace Safety and Security = 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings /
by:
Susilo, Willy.; Shen, Jian.; SpringerLink (Online service); Chen, Xiaofeng.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information security and privacy = 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018 : proceedings /
by:
SpringerLink (Online service); Susilo, Willy.; Workshop on the Preservation of Stability under Discretization ((2001 :); Yang, Guomin.
(Language materials, printed)
Advances in Cyber Security: Principles, Techniques, and Applications
by:
Chen, Xiaofeng.; Susilo, Willy.; SpringerLink (Online service); Li, Kuan-Ching.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information security = 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Susilo, Willy.; SpringerLink (Online service)
(Language materials, printed)
Information Security = 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings /
by:
Li, Yannan.; Deng, Robert H.; Guo, Fuchun.; SpringerLink (Online service); Intan, Rolly.; Susilo, Willy.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Security = 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings /
by:
Chen, Xiaofeng.; SpringerLink (Online service); Guo, Fuchun.; Zhang, Yudi.; Intan, Rolly.; Susilo, Willy.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Provable security = 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013 : proceedings /
by:
Susilo, Willy.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Reyhanitabar, Reza.
(Language materials, printed)
Information security and privacy = 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012 : proceedings /
by:
Mu, Yi.; Seberry, Jennifer.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Susilo, Willy.
(Language materials, printed)
Information Security = 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings /
by:
Meng, Weizhi.; Intan, Rolly.; Susilo, Willy.; Liu, Joseph K.; SpringerLink (Online service); Katsikas, Sokratis.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Security and Privacy = 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings /
by:
Nguyen, Khoa.; Yang, Guomin.; Susilo, Willy.; SpringerLink (Online service); Guo, Fuchun.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Security and Privacy = 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings /
by:
SpringerLink (Online service); Susilo, Willy.; Yang, Guomin.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
Seberry, Jennifer.; Workshop on the Preservation of Stability under Discretization ((2001 :); Mu, Yi.; Susilo, Willy.; SpringerLink (Online service)
(Language materials, printed)
Provable security = 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Kim, Jongkil.; Susilo, Willy.; SpringerLink (Online service); Baek, Joonsang.
(Language materials, printed)
Cyber Security Meets Machine Learning
by:
Susilo, Willy.; SpringerLink (Online service); Bertino, Elisa.; Chen, Xiaofeng.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Introduction to Security Reduction
by:
Mu, Yi.; Susilo, Willy.; SpringerLink (Online service); Guo, Fuchun.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Information Security and Privacy = 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings /
by:
Mu, Yi.; Seberry, Jennifer.; Workshop on the Preservation of Stability under Discretization ((2001 :); Susilo, Willy.; SpringerLink (Online service)
(Language materials, printed)
Introduction to security reduction
by:
Mu, Yi.; Susilo, Willy.; Guo, Fuchun.; SpringerLink (Online service)
(Language materials, printed)
Information Security Practice and Experience = 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings /
by:
Mu, Yi.; Workshop on the Preservation of Stability under Discretization ((2001 :); Susilo, Willy.; Chen, Liqun.; SpringerLink (Online service)
(Language materials, printed)
Show more
Fewer
Subjects
Data protection.
Artificial intelligence.
Computer Communication Networks.
Software engineering.
Machine learning.
Application software.
e-Commerce/e-business.
Data Structures, Cryptology and Information Theory.
Coding theory.
Computers.
Mobile and Network Security.
Data Structures and Information Theory.
Algorithm Analysis and Problem Complexity.
Computer networks .
Computers
Coding and Information Theory.
Data structures (Computer science).
Computer Science.
Computer vision.
Management of Computing and Information Systems.
Computer communication systems.
Security.
Computer networks—Security measures.
Computing Milieux.
Data encryption (Computer science)
Computer security.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Computer organization.
Computer engineering.
Systems and Data Security.
Data protection
Computer Appl. in Administrative Data Processing.
Computer Systems Organization and Communication Networks.
Artificial Intelligence.
Data encryption (Computer science).
Computer Applications.
Information Storage and Retrieval.
Computer Science, general.
Image processing—Digital techniques.
Software Engineering/Programming and Operating Systems.
Data Encryption.
Information theory.
Law and legislation.
Computer networks
Computers and civilization.
Computer Engineering and Networks.
Computer security
Legal Aspects of Computing.
Information Systems and Communication Service.
Computers and Society.
Cryptology.
Machine Learning.
Optical data processing.
Data and Information Security.
Cryptography.