Advanced Sciences and Technologies for Security Applications最新文献

筛选
英文 中文
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography 在VANET中使用最优轻量级加密技术通过可靠车辆安全传输数据
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-16837-7_9
P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja, K. S. Kumar
{"title":"Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography","authors":"P. Manickam, K. Shankar, E. Perumal, M. Ilayaraja, K. S. Kumar","doi":"10.1007/978-3-030-16837-7_9","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128592773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Medical Response 医疗反应
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69162-2_17
P. A. Karam
{"title":"Medical Response","authors":"P. A. Karam","doi":"10.1007/978-3-030-69162-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-69162-2_17","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124454629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open Source Intelligence for Energy Sector Cyberattacks 能源部门网络攻击的开源情报
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_14
A. Keliris, Charalambos Konstantinou, Marios Sazos, M. Maniatakos
{"title":"Open Source Intelligence for Energy Sector Cyberattacks","authors":"A. Keliris, Charalambos Konstantinou, Marios Sazos, M. Maniatakos","doi":"10.1007/978-3-030-00024-0_14","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_14","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Who Should Regulate Extremist Content Online? 谁来监管网络上的极端主义内容?
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-90221-6_11
Alastair Reed, Adam Henschke
{"title":"Who Should Regulate Extremist Content Online?","authors":"Alastair Reed, Adam Henschke","doi":"10.1007/978-3-030-90221-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Computers 量子计算机
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-72721-5_3
A. Lele
{"title":"Quantum Computers","authors":"A. Lele","doi":"10.1007/978-3-030-72721-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-72721-5_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"3 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Evolution of Surface and Groundwater Quality 地表和地下水水质演变的模拟
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-76008-3_30
E. Beilicci, R. Beilicci, M. Visescu
{"title":"Modeling the Evolution of Surface and Groundwater Quality","authors":"E. Beilicci, R. Beilicci, M. Visescu","doi":"10.1007/978-3-030-76008-3_30","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_30","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116020978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Application Tool for Assessing Groundwater Sustainability—A Case Study in Rural-Maharashtra, India 地下水可持续性评估的网络应用工具——以印度马哈拉施特拉邦农村为例
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-76008-3_28
Aman Srivastava, L. Khadke, P. Chinnasamy
{"title":"Web Application Tool for Assessing Groundwater Sustainability—A Case Study in Rural-Maharashtra, India","authors":"Aman Srivastava, L. Khadke, P. Chinnasamy","doi":"10.1007/978-3-030-76008-3_28","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_28","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensemaking and Security: How Climate Change Shapes National Security 感知与安全:气候变化如何影响国家安全
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-71998-2_6
R. Prizzia
{"title":"Sensemaking and Security: How Climate Change Shapes National Security","authors":"R. Prizzia","doi":"10.1007/978-3-030-71998-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-71998-2_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering Citizens with Tools for Personalized Health is the Future of Effective Public Health Responses 为公民提供个性化医疗工具是有效公共卫生应对措施的未来
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-71998-2_13
Jordan Masys, Chris Peng, Andrew C Ahn, A. Masys
{"title":"Empowering Citizens with Tools for Personalized Health is the Future of Effective Public Health Responses","authors":"Jordan Masys, Chris Peng, Andrew C Ahn, A. Masys","doi":"10.1007/978-3-030-71998-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-71998-2_13","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification of Vulnerabilities in Networked Systems 网络系统中的漏洞识别
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_5
L. Faramondi, R. Setola
{"title":"Identification of Vulnerabilities in Networked Systems","authors":"L. Faramondi, R. Setola","doi":"10.1007/978-3-030-00024-0_5","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131043108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信