Advances in Information Security最新文献

筛选
英文 中文
Identifying Malicious Code Through Reverse Engineering 通过逆向工程识别恶意代码
Advances in Information Security Pub Date : 2009-03-26 DOI: 10.1007/978-0-387-89468-3
Abhishek Singh
{"title":"Identifying Malicious Code Through Reverse Engineering","authors":"Abhishek Singh","doi":"10.1007/978-0-387-89468-3","DOIUrl":"https://doi.org/10.1007/978-0-387-89468-3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131244992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Secure Key Establishment 安全密钥建立
Advances in Information Security Pub Date : 2008-12-04 DOI: 10.1007/978-0-387-87969-7
Kim-Kwang Raymond Choo
{"title":"Secure Key Establishment","authors":"Kim-Kwang Raymond Choo","doi":"10.1007/978-0-387-87969-7","DOIUrl":"https://doi.org/10.1007/978-0-387-87969-7","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Global Initiatives to Secure Cyberspace - An Emerging Landscape 网络空间安全的全球倡议——一个新兴的格局
Advances in Information Security Pub Date : 2008-12-04 DOI: 10.1007/978-0-387-09764-0
Michael Portnoy, S. Goodman
{"title":"Global Initiatives to Secure Cyberspace - An Emerging Landscape","authors":"Michael Portnoy, S. Goodman","doi":"10.1007/978-0-387-09764-0","DOIUrl":"https://doi.org/10.1007/978-0-387-09764-0","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134443092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secure Multi-Party Non-Repudiation Protocols and Applications 安全多方不可否认协议和应用
Advances in Information Security Pub Date : 2008-12-02 DOI: 10.1007/978-0-387-75630-1
J. A. Onieva, Javier López, Jianying Zhou
{"title":"Secure Multi-Party Non-Repudiation Protocols and Applications","authors":"J. A. Onieva, Javier López, Jianying Zhou","doi":"10.1007/978-0-387-75630-1","DOIUrl":"https://doi.org/10.1007/978-0-387-75630-1","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security for Telecommunications Networks 电讯网络保安
Advances in Information Security Pub Date : 2008-07-07 DOI: 10.1007/978-0-387-72442-3
Patrick Traynor, P. Mcdaniel, T. F. Porta
{"title":"Security for Telecommunications Networks","authors":"Patrick Traynor, P. Mcdaniel, T. F. Porta","doi":"10.1007/978-0-387-72442-3","DOIUrl":"https://doi.org/10.1007/978-0-387-72442-3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Insider Attack and Cyber Security - Beyond the Hacker 内部攻击和网络安全-超越黑客
Advances in Information Security Pub Date : 2008-04-07 DOI: 10.1007/978-0-387-77322-3
S. Stolfo, S. Bellovin, A. Keromytis, S. Sinclair, Sean W. Smith, Shlomo Hershkop
{"title":"Insider Attack and Cyber Security - Beyond the Hacker","authors":"S. Stolfo, S. Bellovin, A. Keromytis, S. Sinclair, Sean W. Smith, Shlomo Hershkop","doi":"10.1007/978-0-387-77322-3","DOIUrl":"https://doi.org/10.1007/978-0-387-77322-3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Vulnerability Analysis and Defense for the Internet 互联网漏洞分析与防御
Advances in Information Security Pub Date : 2008-01-24 DOI: 10.1007/978-0-387-74390-5
Abhishek Singh, Baibhav Singh, Hirosh Joseph
{"title":"Vulnerability Analysis and Defense for the Internet","authors":"Abhishek Singh, Baibhav Singh, Hirosh Joseph","doi":"10.1007/978-0-387-74390-5","DOIUrl":"https://doi.org/10.1007/978-0-387-74390-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data Warehousing and Data Mining Techniques for Cyber Security 网络安全中的数据仓库和数据挖掘技术
Advances in Information Security Pub Date : 2006-12-13 DOI: 10.1007/978-0-387-47653-7
A. Singhal
{"title":"Data Warehousing and Data Mining Techniques for Cyber Security","authors":"A. Singhal","doi":"10.1007/978-0-387-47653-7","DOIUrl":"https://doi.org/10.1007/978-0-387-47653-7","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123790740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Electronic Postage Systems - Technology, Security, Economics 电子邮资系统-技术,安全,经济
Advances in Information Security Pub Date : 2006-12-11 DOI: 10.1007/978-0-387-44606-6
G. Bleumer
{"title":"Electronic Postage Systems - Technology, Security, Economics","authors":"G. Bleumer","doi":"10.1007/978-0-387-44606-6","DOIUrl":"https://doi.org/10.1007/978-0-387-44606-6","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Security Policies and Procedures 网络安全政策和程序
Advances in Information Security Pub Date : 2006-12-11 DOI: 10.1007/978-0-387-47955-2
Douglas W. Frye
{"title":"Network Security Policies and Procedures","authors":"Douglas W. Frye","doi":"10.1007/978-0-387-47955-2","DOIUrl":"https://doi.org/10.1007/978-0-387-47955-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126172418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信