Advances in Information Security最新文献

筛选
英文 中文
Consequence-Based Resilient Architectures 基于结果的弹性架构
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-18214-4_2
C. S. Michel, Sarah Freeman
{"title":"Consequence-Based Resilient Architectures","authors":"C. S. Michel, Sarah Freeman","doi":"10.1007/978-3-030-18214-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-18214-4_2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Physical Anomaly Detection for Power Grid with Machine Learning 基于机器学习的电网网络物理异常检测
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-18214-4_3
Pengyuan Wang, M. Govindarasu
{"title":"Cyber-Physical Anomaly Detection for Power Grid with Machine Learning","authors":"Pengyuan Wang, M. Govindarasu","doi":"10.1007/978-3-030-18214-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-18214-4_3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proactive Defense Through Deception 通过欺骗进行主动防御
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-18214-4_9
Massimiliano Albanese, S. Jajodia
{"title":"Proactive Defense Through Deception","authors":"Massimiliano Albanese, S. Jajodia","doi":"10.1007/978-3-030-18214-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-18214-4_9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"520 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Beyond Mirages: Deception in ICS—Lessons Learned from Traditional Networks 超越海市蜃楼:ics中的欺骗——从传统网络中吸取的教训
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-18214-4_7
Nathaniel B. Soule, P. Pal
{"title":"Beyond Mirages: Deception in ICS—Lessons Learned from Traditional Networks","authors":"Nathaniel B. Soule, P. Pal","doi":"10.1007/978-3-030-18214-4_7","DOIUrl":"https://doi.org/10.1007/978-3-030-18214-4_7","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132861642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failed Translations 失败的翻译
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-66583-8_8
M. Ryan
{"title":"Failed Translations","authors":"M. Ryan","doi":"10.1007/978-3-030-66583-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-66583-8_8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Defense II 移动目标防御II
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4614-5416-8
S. Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff X. Wang, X. S. Wang
{"title":"Moving Target Defense II","authors":"S. Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff X. Wang, X. S. Wang","doi":"10.1007/978-1-4614-5416-8","DOIUrl":"https://doi.org/10.1007/978-1-4614-5416-8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125790478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Auxiliary Impacts 辅助的影响
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-66583-8_7
M. Ryan
{"title":"Auxiliary Impacts","authors":"M. Ryan","doi":"10.1007/978-3-030-66583-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-66583-8_7","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clone Detection 克隆检测
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-34238-8_8
S. Alrabaee, M. Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, D. Mouheb, He Huang, Aiman Hanna
{"title":"Clone Detection","authors":"S. Alrabaee, M. Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, D. Mouheb, He Huang, Aiman Hanna","doi":"10.1007/978-3-030-34238-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-34238-8_8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Current Standards for Cyber-Hygiene in Industrial Control System Environments 工业控制系统环境中的网络卫生现行标准
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-18214-4_1
Ken Modeste
{"title":"Current Standards for Cyber-Hygiene in Industrial Control System Environments","authors":"Ken Modeste","doi":"10.1007/978-3-030-18214-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-18214-4_1","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124212933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conclusion 结论
Advances in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-34238-8_10
S. Alrabaee, M. Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, D. Mouheb, He Huang, Aiman Hanna
{"title":"Conclusion","authors":"S. Alrabaee, M. Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, D. Mouheb, He Huang, Aiman Hanna","doi":"10.1007/978-3-030-34238-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-34238-8_10","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信