-
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Android Protection System
This research develops the Android Protection System (APS), a hardware-implemented application secu
-
Active Computer Network Defense
A Presidential Commission, several writers, and numerous network security incidents have called att
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
-
-
-
-
-
-
-
Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
Protecting intellectual property contained in application source code and preventing tampering with
-
Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network
The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft t
-
Software Protection Against Reverse Engineering Tools
Advances in technology have led to the use of simple to use automated debugging tools which can be
-
Patching the Wetware
In the practice of information security, it is increasingly observed that the weakest link in the s
-
Psychological Operations Within the Cyberspace Domain
The importance of cyberspace and the utility of networked computer systems have grown exponentially
-
Offensive Cyber Capability
The subject of cyberterrorism has become a topic of increasing importance to both the U.S. governme
-
Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
Over 725 steganography tools are available over the Internet, each providing a method for covert tr
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Microsoft Security Copilot
Packt 出版Become a Security Copilot expert and harness the power of AI to stay ahead in the evolving landscap
-
-
Crystal Reports 2008
McGraw-Hill 出版Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher f
-
-
Forest Health Monitoring Using AI and Remote Sensing
Ingram 出版Scientific Study from the year 2025 in the subject Computer Sciences - Artificial Intelligence, lan
-
-
-
-
Emerging Technologies in Computing
Springer 出版This book LNICST 623 constitutes the refereed conference proceedings of the 7th International Confe
-
Ethics for the Real World
Harvard 出版We often make small ethical compromises for "good" reasons: We lie to a customer because our boss a
-
Privacy Enhancing Techniques
Springer 出版This book provides a comprehensive exploration of advanced privacy-preserving methods, ensuring sec
-
Computer Security for ASSIST
This thesis examines the multilevel security problem of simultaneous processing of compartmented an