Advances in Information Security,

書目資訊

austin protocol compiler
intrusion detection and correlation
image and video encryption
security in e-learning
botnet detection
vulnerability analysis and defense f...
insider attack and cyber security
intrusion detection systems
security for telecommunications networks
preserving privacy in data outsourcing
moving target defense
spyware and adware
global initiatives to secure cyberspace
secure key establishments
identifying malicious code through r...
security and dependability for ambie...
network science and cybersecurity
secure wireless sensor networks
cyber denial, deception and counter ...
evolution of cyber technologies and ...
moving target defense ii
iris biometrics
security management in mobile cloud ...
online banking security measures and...
security and resiliency analytics fo...
preserving privacy against side-chan...
security, privacy, and anonymization...
differential privacy and applications
cyber threat intelligence
smart micro-grid systems security an...
versatile cybersecurity
security and privacy issues in senso...
proactive and dynamic network defense
intrusion detection systems
evolution of cyber technologies and ...
secure wireless sensor networks
cyber warfare
cyber denial, deception and counter ...
protecting privacy in data release
security and resiliency analytics fo...
preserving privacy against side-chan...
smart micro-grid systems security an...
versatile cybersecurity
cyber threat intelligence
security and privacy issues in senso...
malicious attack propagation and sou...
cloud security auditing
industrial control systems security ...
proactive and dynamic network defense
cryptography arithmetic
blockchain cybersecurity, trust and ...
binary code fingerprinting for cyber...
multivariate public key cryptosystems
android malware detection using mach...
fog/edge computing for security, pri...
new dimensions of information warfare
 
 
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入