-
Development of an Malicious Insider Composite Vulnerability Assessment Methodology
Trusted employees pose a major threat to information systems. Despite ad-vances in prevention, dete
-
The Psychology of Cybersecurity
Routledge 出版This book takes a fresh look at the psychology of cybersecurity and IT management, discussing the r
-
From Web1 to Web3
CRC Press 出版From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ol
-
Advancements In Smart Card And Biometric Technology
Ingram 出版The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Modeling and Analyzing Security Protocols with Tamarin
Springer 出版The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specificati
-
AWS for Solutions Architects - Third Edition
Packt 出版Master AWS architecture and design secure, scalable, production-ready cloud systems. This practical
-
Cyber Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Federal It Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
Inclusive Design for Accessibility
Packt 出版Through insights from twelve industry voices, learn how to create truly accessible and inclusive di
-
Research and Innovation Forum 2024
Springer 出版This book features research presented and discussed during the Research & Innovation Forum (Rii For
-
Cyber Threat Hunters Handbook
Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidd
-
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Springer 出版This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th Inte
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Advanced Intelligent Computing Technology and Applications
Springer 出版The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, const
-
Moderator-topics
"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and co
-
Cloud Computing
Springer 出版This book LNICST 617 constitutes the refereed proceedings of the 12th EAI International Conference
-
Hacking Voice-Controllable Devices
Springer 出版Voice-controllable devices allow hands-free interactions, offering a modern user experience and hel
-
Empowering Iot: Reliability, Network Management, Sensing, and Probabilistic Charging in Wireless Sensor Networks
Springer 出版This book provides a comprehensive exploration of both fundamental principles and practical enginee
-
Digital Degrowth
Polity Press 出版We are fast approaching the point of "peak digital", with the continued mass production and excessi
-
The Cybernetic Society
Basic Books 出版"An optimistic, shimmering image of a world where AI operates in service to humankind" (Kirkus) arg
-
Information Security
The BiblioGov Project is an effort to expand awareness of the public documents and records of the U
-
CompTIA(R) SecurityX(R) CAS-005 Certification Guide - Second Edition
Packt 出版Become a cybersecurity expert with comprehensive CAS-005 preparation using this detailed guide pack
-
Information Systems Security and Privacy
Springer 出版This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags
Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are
-
Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
Network-centric intelligence collection operations use computers and the Internet to identify threa
-
Stastistical Machine Translation of Japanese
Statistical machine translation (SMT) uses large amounts of language training data to statistically
-
Spectral Domain RF Fingerprinting for 802.11 Wireless Devices
The increase in availability and reduction in cost of commercial communication devices (IEEE compli
-
Virtualization Technology Applied to Rootkit Defense
This research effort examines the idea of applying virtualization hardware to enhance operating sys
-
Toward Cyber Omniscience
It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United
-
Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
Because the cyberspace environment is changing so quickly, the slow, methodical Department of Defen
-
An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodo
-
Cognitive Computation and Systems
Springer 出版This book constitutes the refereed proceedings of the Third International Conference on Cognitive C
-
Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional
-
Metamorphic Program Fragmentation as a Software Protection
Unauthorized reverse-engineering of programs and algorithms is a major problem for the software ind
-
Cyber Capabilities for Global Strike in 2035
This paper examines global strike, a core Air Force capacity to quickly and precisely attack any ta
-
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it tr
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Developing a Corpus Specific Stop-List Using Quantitative Comparison
We have become overwhelmed with electronic information and it seems our situation is not going to i
-
An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SS
-
Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection
Detecting network intruders and malicious software is a significant problem for network administrat
-
Accelerating Malware Detection via a Graphics Processing Unit
Real-time malware analysis requires processing large amounts of data storage to look for suspicious
-
Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network
The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft t
-
Cybermad
"Cyberspace has grown in importance to the United States (US), as well as the rest of the word. As
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
Geolocation of a Node on a Local Area Network
Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Loc
-
Toward Cyber Omniscience
It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United