Advanced Sciences and Technologies for Security Applications最新文献

筛选
英文 中文
Border Management in Transformation 转型中的边境管理
Advanced Sciences and Technologies for Security Applications Pub Date : 2020-11-27 DOI: 10.1007/978-3-030-62728-7
J. Wagner
{"title":"Border Management in Transformation","authors":"J. Wagner","doi":"10.1007/978-3-030-62728-7","DOIUrl":"https://doi.org/10.1007/978-3-030-62728-7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correction to: Shared Images and Camera Fingerprinting May Lead to Privacy Issues 更正:共享图像和相机指纹可能导致隐私问题
Advanced Sciences and Technologies for Security Applications Pub Date : 2020-09-24 DOI: 10.1007/978-3-030-39489-9_14
R. Rouhi, Flavio Bertini, D. Montesi
{"title":"Correction to: Shared Images and Camera Fingerprinting May Lead to Privacy Issues","authors":"R. Rouhi, Flavio Bertini, D. Montesi","doi":"10.1007/978-3-030-39489-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-39489-9_14","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114033060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon? 互联的阴暗面:社交媒体是一种网络武器?
Advanced Sciences and Technologies for Security Applications Pub Date : 2020-09-08 DOI: 10.1007/978-3-030-47511-6_11
S. Geraldes
{"title":"The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?","authors":"S. Geraldes","doi":"10.1007/978-3-030-47511-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-47511-6_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Policing in 2025: A Scenario 2025年的预测性警务:一个场景
Advanced Sciences and Technologies for Security Applications Pub Date : 2020-07-18 DOI: 10.1007/978-3-030-50613-1_9
Kevin Macnish, David Wright, Tilimbe Jiya
{"title":"Predictive Policing in 2025: A Scenario","authors":"Kevin Macnish, David Wright, Tilimbe Jiya","doi":"10.1007/978-3-030-50613-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-50613-1_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions 相互依赖基础设施面临中断时弹性的博弈论决策
Advanced Sciences and Technologies for Security Applications Pub Date : 2019-01-02 DOI: 10.1007/978-3-030-00024-0_6
Yiping Fang, E. Zio
{"title":"Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions","authors":"Yiping Fang, E. Zio","doi":"10.1007/978-3-030-00024-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin 针对西方国家关键国家基础设施的高级黑客组织的分析和分类:APT28、RED October和Regin
Advanced Sciences and Technologies for Security Applications Pub Date : 2019-01-02 DOI: 10.1007/978-3-030-00024-0_12
Henry Mwiki, T. Dargahi, A. Dehghantanha, Kim-Kwang Raymond Choo
{"title":"Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin","authors":"Henry Mwiki, T. Dargahi, A. Dehghantanha, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-00024-0_12","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_12","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123917170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Critical Infrastructures 关键基础设施
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-46908-5_2
S. Rass, S. Schauer, Sandra König, Quanyan Zhu
{"title":"Critical Infrastructures","authors":"S. Rass, S. Schauer, Sandra König, Quanyan Zhu","doi":"10.1007/978-3-030-46908-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-46908-5_2","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Water Treatment by Green Coagulants—Nature at Rescue 绿色混凝剂的水处理——自然救援
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-76008-3_9
Manoj Kumar Karnena, V. Saritha
{"title":"Water Treatment by Green Coagulants—Nature at Rescue","authors":"Manoj Kumar Karnena, V. Saritha","doi":"10.1007/978-3-030-76008-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"20 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116710856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Holistic Authentication Framework for Virtual Agents; UK Banking Industry 面向虚拟代理的整体认证框架英国银行业
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-87166-6_10
Hasitha Hettiarachchi Hettiarachchige, H. Jahankhani
{"title":"Holistic Authentication Framework for Virtual Agents; UK Banking Industry","authors":"Hasitha Hettiarachchi Hettiarachchige, H. Jahankhani","doi":"10.1007/978-3-030-87166-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_10","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117218682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Utilization of Blockchain for Enhancing Big Data Security and Veracity 利用区块链技术提高大数据的安全性和准确性
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-35642-2_8
S. Wibowo, A. D. Sumari
{"title":"The Utilization of Blockchain for Enhancing Big Data Security and Veracity","authors":"S. Wibowo, A. D. Sumari","doi":"10.1007/978-3-030-35642-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-35642-2_8","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信