-
-
-
-
-
-
-
-
-
-
-
-
-
Advancements In Smart Card And Biometric Technology
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Modeling and Analyzing Security Protocols with Tamarin
Springer 出版The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specificati
-
AWS for Solutions Architects - Third Edition
Packt 出版Master AWS architecture and design secure, scalable, production-ready cloud systems. This practical
-
-
-
-
Research and Innovation Forum 2024
Springer 出版This book features research presented and discussed during the Research & Innovation Forum (Rii For
-
Cyber Threat Hunters Handbook
Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidd
-
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
-
Cloud Computing
Springer 出版This book LNICST 617 constitutes the refereed proceedings of the 12th EAI International Conference
-
Hacking Voice-Controllable Devices
Springer 出版Voice-controllable devices allow hands-free interactions, offering a modern user experience and hel
-
Empowering Iot: Reliability, Network Management, Sensing, and Probabilistic Charging in Wireless Sensor Networks
Springer 出版This book provides a comprehensive exploration of both fundamental principles and practical enginee
-
-
-
-
-
Information Systems Security and Privacy
Springer 出版This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
-
-
-
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology