語系:
繁體中文
English
說明(常見問題)
登入
Advances in Information Security,
Titles
intrusion detection systems
intrusion detection systems
identifying malicious code through r...
identifying malicious code through reverse engineering
security solutions and applied crypt...
security solutions and applied cryptography in smart grid communications /
preserving privacy in data outsourcing
preserving privacy in data outsourcing
moving target defense
moving target defense
artificial intelligence for cybersecurity
protecting privacy in data release
protecting privacy in data release
cyber threat intelligence
cyber threat intelligence
iris biometrics
iris biometrics
evolution of cyber technologies and ...
evolution of cyber technologies and operations to 2035
cyber warfare
cyber warfare
cyber-security of scada and other in...
cyber-security of scada and other industrial control systems
new dimensions of information warfare
new dimensions of information warfare
austin protocol compiler
austin protocol compiler
security and privacy issues in senso...
security and privacy issues in sensor networks and iot
cryptography arithmetic
cryptography arithmetic
security breaches and threat prevent...
security breaches and threat prevention in the internet of things /
primality testing and integer factor...
primality testing and integer factorization in public-key cryptography
malicious attack propagation and sou...
malicious attack propagation and source identification
binary code fingerprinting for cyber...
binary code fingerprinting for cybersecurity
security and resiliency analytics fo...
security and resiliency analytics for smart grids
threat mitigation and detection of c...
threat mitigation and detection of cyber warfare and terrorism activities /
cybersecurity issues, challenges, and solutions in the business world
security solutions for hyperconnectivity and the internet of things /
intrusion detection and correlation
intrusion detection and correlation
cybersecurity awareness
versatile cybersecurity
versatile cybersecurity
cyber denial, deception and counter ...
cyber denial, deception and counter deception
preserving privacy against side-chan...
preserving privacy against side-channel leaks
secure key establishments
secure key establishments
blockchain cybersecurity, trust and ...
blockchain cybersecurity, trust and privacy
cyber threat intelligence
cyber threat intelligence
cloud security auditing
cloud security auditing
android malware detection using mach...
android malware detection using machine learning
insider attack and cyber security
insider attack and cyber security
global initiatives to secure cyberspace
global initiatives to secure cyberspace
security and dependability for ambie...
security and dependability for ambient intelligence
personal data protection and legal developments in the european union
preserving privacy against side-chan...
preserving privacy against side-channel leaks
managing security issues and the hid...
managing security issues and the hidden dangers of wearable technologies /
network science and cybersecurity
network science and cybersecurity
proactive and dynamic network defense
proactive and dynamic network defense
handbook of research on threat detec...
handbook of research on threat detection and countermeasures in network security /
moving target defense ii
moving target defense ii
advanced digital image steganography...
advanced digital image steganography using lsb, pvd, and emd :
industrial control systems security ...
industrial control systems security and resiliency
ransomware revolution: the rise of a...
ransomware revolution: the rise of a prodigious cyber threat
fog/edge computing for security, pri...
fog/edge computing for security, privacy, and applications
vulnerability analysis and defense f...
vulnerability analysis and defense for the internet
improving information security pract...
improving information security practices through computational intelligence /
differential privacy and applications
differential privacy and applications
cyber denial, deception and counter ...
cyber denial, deception and counter deception
cybersecurity capabilities in developing nations and its impact on global security
smart micro-grid systems security an...
smart micro-grid systems security and privacy
security and risk analysis for intelligent edge computing
online banking security measures and...
online banking security measures and data protection /
botnet detection
botnet detection
security management in mobile cloud ...
security management in mobile cloud computing /
cyber-security of scada and other in...
cyber-security of scada and other industrial control systems
security in e-learning
security in e-learning
security, privacy, and anonymization...
security, privacy, and anonymization in social networks :
intrusion detection systems
intrusion detection systems
spyware and adware
spyware and adware
secure multi-party non-repudiation p...
secure multi-party non-repudiation protocols and applications
smart micro-grid systems security an...
smart micro-grid systems security and privacy
physical layer security in power line communications
multivariate public key cryptosystems
multivariate public key cryptosystems
evolution of cyber technologies and ...
evolution of cyber technologies and operations to 2035
secure wireless sensor networks
secure wireless sensor networks
proactive and dynamic network defense
proactive and dynamic network defense
security for telecommunications networks
security for telecommunications networks
image and video encryption
image and video encryption
research developments in biometrics ...
research developments in biometrics and video processing techniques /
cross-layer design for secure and re...
cross-layer design for secure and resilient cyber-physical systems
secure wireless sensor networks
secure wireless sensor networks
security and privacy issues in senso...
security and privacy issues in sensor networks and iot /
impacts and risk assessment of techn...
impacts and risk assessment of technology for internet security
versatile cybersecurity
versatile cybersecurity
security and resiliency analytics fo...
security and resiliency analytics for smart grids
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入