{"title":"Protecting Privacy in Data Release","authors":"S. Vimercati, S. Foresti, G. Livraga, P. Samarati","doi":"10.1007/978-3-319-16109-9","DOIUrl":"https://doi.org/10.1007/978-3-319-16109-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Defense and Situational Awareness","authors":"A. Kott, Cliff X. Wang, R. Erbacher","doi":"10.1007/978-3-319-11391-3","DOIUrl":"https://doi.org/10.1007/978-3-319-11391-3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Touchless Palmprint Recognition Systems","authors":"","doi":"10.1007/978-3-319-10365-5","DOIUrl":"https://doi.org/10.1007/978-3-319-10365-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Science and Cybersecurity","authors":"R. Pino","doi":"10.1007/978-1-4614-7597-2","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Healthcare Information Security","authors":"C. Shoniregun, Kudakwashe Dube, F. Mtenzi","doi":"10.1007/978-0-387-84919-5","DOIUrl":"https://doi.org/10.1007/978-0-387-84919-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123172454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption for Digital Content","authors":"A. Kiayias, Serdar Pehlivanoglu","doi":"10.1007/978-1-4419-0044-9","DOIUrl":"https://doi.org/10.1007/978-1-4419-0044-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy in Data Outsourcing","authors":"S. Foresti","doi":"10.1007/978-1-4419-7659-8","DOIUrl":"https://doi.org/10.1007/978-1-4419-7659-8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spyware and Adware","authors":"John Aycock","doi":"10.1007/978-0-387-77741-2","DOIUrl":"https://doi.org/10.1007/978-0-387-77741-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Cryptographic Access Control","authors":"Anne Kayem, S. Akl, Patrick Martin","doi":"10.1007/978-1-4419-6655-1","DOIUrl":"https://doi.org/10.1007/978-1-4419-6655-1","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Intrusion Detection and Prevention - Concepts and Techniques","authors":"A. Ghorbani, Wei Lu, Mahbod Tavallaee","doi":"10.1007/978-0-387-88771-5","DOIUrl":"https://doi.org/10.1007/978-0-387-88771-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}