Advances in Information Security,

書目資訊

[1 - 20] 起自 25 查到結果 (0.119 sec)
頁數: [ 1 ] 2
insider threats in cyber security
insider threats in cyber security
austin protocol compiler
austin protocol compiler
electronic healthcare information se...
electronic healthcare information security
spyware and adware
spyware and adware
cyber situational awareness
cyber situational awareness
encryption for digital content
encryption for digital content
global initiatives to secure cyberspace
global initiatives to secure cyberspace
botnet detection
botnet detection
insider attack and cyber security
insider attack and cyber security
moving target defense
moving target defense
secure multi-party non-repudiation p...
secure multi-party non-repudiation protocols and applications
adaptive cryptographic access control
adaptive cryptographic access control
identifying malicious code through r...
identifying malicious code through reverse engineering
primality testing and integer factor...
primality testing and integer factorization in public-key cryptography
intrusion detection and correlation
intrusion detection and correlation
secure key establishments
secure key establishments
impacts and risk assessment of techn...
impacts and risk assessment of technology for internet security
security in e-learning
security in e-learning
network intrusion detection and prev...
network intrusion detection and prevention
security and dependability for ambie...
security and dependability for ambient intelligence
 
 
變更密碼
登入