熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 65 筆, 頁數 1 / 2
呈現:
Network Security Metrics
Reviews a range of network security models that focus on combining individual metric scores obtained... more |
|||
Cyber Deception: Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cybe... more |
|||
Network Security Metrics
Reviews a range of network security models that focus on combining individual metric scores obtained... more |
|||
Theory and Models for Cyber Situation Awareness
Today, when a security incident happens, the top three questions a cyber operation center would ask ... more |
|||
How Can You Blame My Innocence for Your Crime
|
|||
Cyber Deception: Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cybe... more |
|||
Cyber Warfare: Building the Scientific Foundation
This book features a wide spectrum of the latest computer science research relating to cyber warfare... more |
|||
Network Hardening: An Automated Approach to Improving Network Security
This Springer Brief examines the tools based on attack graphs that help reveal network hardening thr... more |
|||
Secure Cloud Computing
. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments...... more |
|||
Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Pro
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ... more |
|||
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanis... more |
|||
Multilevel Secure Transaction Processing
Information security is receiving a great deal of attention as computers increasingly process more a... more |
|||
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more |
|||
Cyber Situational Awareness: Issues and Research
Motivation for the Book This book seeks to establish the state of the art in the cyber situational a... more |
|||
Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Information Sy... more |
|||
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of... more |
|||
Trusted Recovery and Defensive Information Warfare
Information security concerns the confidentiality, integrity, and availability of information proces... more |
|||
Time Granularities in Databases, Data Mining, and Temporal Reasoning
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized uni... more |
|||
Preserving Privacy in On-Line Analytical Processing (Olap)
Addresses the privacy issue of On-Line Analytic Processing systems Details how to keep the performan... more |
|||
Handbook of Database Security: Applications and Trends
This handbook provides an up-to-date overview of data security models, techniques, and architectures... more |
|||
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 20
These proceedings contain the papers selected for presentation at the 6th - ternational Conference o... more |
|||
Data and Applications Security and Privacy XXIV: 24th Annual Ifip Wg 11.3 Working Conference Rome, Italy, June 21-23, 2010 Proce
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and... more |
|||
Cyber Situational Awareness: Issues and Research
Motivation for the Book This book seeks to establish the state of the art in the cyber situational a... more |
|||
Privacy in Location-based Applications: Research Issues and Emerging Trends
Location-based applications refer to those that use location data in a prominent manner. Location da... more |
|||
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP Sec’0
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information... more |
|||
Handbook of Database Security
This handbook provides an up-to-date overview of data security models, techniques, and architectures... more |
|||
Secure Data Management in Decentralized Systems
The field of database security has expanded greatly, due to the rapid development of the global inte... more |
|||
Preserving Privacy in On-Line Analytical Processing (OLAP)
Addresses the privacy issue of On-Line Analytic Processing systems Details how to keep the performan... more |
|||
Data And Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data And Applications Security, Storrs, CT, U
The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was hel... more |
|||
Information Security Management, Education And Privacy
Information Security Management, Education and Privacy Edited by Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, and...... more |
|||
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanis... more |
|||
Applications of Data Mining in Computer Security
Data mining is becoming a pervasive technology in activities as diverse as using historical data to ... more |
|||
Trusted Recovery and Defensive Information Warfare
|
|||
Conceptual Modeling-Er 2001: 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : Proceedings
This book constitutes the refereed proceedings of the 20th International Conference on Conceptual Mo... more |
|||
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
|
|||
Time Granularities in Databases, Data Mining, and Temporal Reasoning
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized uni... more |
|||
Multilevel Secure Transaction Processing
Information security is receiving a great deal of attention as computers increasingly process more a... more |
|||
Temporal Databases: Research and Practice
This book grew out of a Dagstuhl seminar organized by the volume editors in June 1997. After the sem... more |
|||
Advanced Transaction Models and Architectures
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage... more |
|||
Adaptive Autonomous Secure Cyber Systems
1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more |
|||
Adaptive Autonomous Secure Cyber Systems
1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 ... more |
|||
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- And Game-Theoretic Approaches to Cyber Security
Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In respons... more |
|||
Cyber Warfare: Building the Scientific Foundation
This book features a wide spectrum of the latest computer science research relating to cyber warfare... more |
|||
Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
This volume constitutes the thoroughly refereed post-conference proceedings of the Second Internatio... more |
|||
Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(fo... more |
|||
Secure Data Management in Decentralized Systems
The field of database security has expanded greatly, due to the rapid development of the global inte... more |
|||
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
Covers recent breakthroughs, accomplishments and future research in Moving Target Defense Presents a... more |
|||
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of... more |
|||
Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2
Security and Protection in Information Processing Systems Edited by Yves Deswarte, Frédéric Cuppens, Sushil Jajodia...... more |
|||
Applications of Data Mining in Computer Security
Data mining is becoming a pervasive technology in activities as diverse as using historical data to ... more |
|||
Advanced Transaction Models and Architectures
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage... more |
|||
Multimedia Database Systems: Issues and Research Directions
The information superhighway will bring vast amounts of information to everyone. Multimedia database... more |
|||
Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec’’08, September 7-10, 2008
|
|||
Journal on Data Semantics II
|
|||
Database Security XII: Status and Prospects
|
|||
Integrity and Internal Control in Information Systems: Ifip Tc11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Inf
|
|||
Advances in Multimedia Information Systems: 4th International Workshop, Mis’’98, Istanbul, Turkey September 24-26, 1998, Proceedings
|
|||
Ict Systems Security and Privacy Protection: 29th Ifip Tc 11 International Conference, Sec 2014, Marrakech, Morocco, June 2-4, 2
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Secu... more |
|||
Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Securit... more |
|||
Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008. Pr
These proceedings contain the papers selected for presentation at the 13th European Symposium on Res... more |