Advanced Sciences and Technologies for Security Applications最新文献

筛选
英文 中文
Statistical Assessment of the Water Quality Using Water Quality Indicators—Case Study from India 利用水质指标对水质进行统计评估——以印度为例
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-76008-3_26
A. Bărbulescu, L. Barbeș, C. Dumitriu
{"title":"Statistical Assessment of the Water Quality Using Water Quality Indicators—Case Study from India","authors":"A. Bărbulescu, L. Barbeș, C. Dumitriu","doi":"10.1007/978-3-030-76008-3_26","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_26","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126746854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classical Machine Learning Algorithms 基于经典机器学习算法的深度学习架构改进的DGA域名检测和分类
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-16837-7_8
R. Vinayakumar, K. Soman, P. Poornachandran, S. Akarsh, M. Elhoseny
{"title":"Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classical Machine Learning Algorithms","authors":"R. Vinayakumar, K. Soman, P. Poornachandran, S. Akarsh, M. Elhoseny","doi":"10.1007/978-3-030-16837-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7_8","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Possibilities of Blockchain Technology for Nuclear Security 区块链技术对核安全的可能性
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-86240-4_5
Maria Lovely Umayam
{"title":"Possibilities of Blockchain Technology for Nuclear Security","authors":"Maria Lovely Umayam","doi":"10.1007/978-3-030-86240-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-86240-4_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model 基于隐含相互依赖模型的最小伪目标集识别及相关问题
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_7
Arun Das, Chenyang Zhou, Joydeep Banerjee, Anisha Mazumder, Arunabha Sen
{"title":"Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model","authors":"Arun Das, Chenyang Zhou, Joydeep Banerjee, Anisha Mazumder, Arunabha Sen","doi":"10.1007/978-3-030-00024-0_7","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radiological and Nuclear Terrorism 放射性和核恐怖主义
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-69162-2
P. A. Karam
{"title":"Radiological and Nuclear Terrorism","authors":"P. A. Karam","doi":"10.1007/978-3-030-69162-2","DOIUrl":"https://doi.org/10.1007/978-3-030-69162-2","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"37 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in Network Services Delivery for 5G Enabled D2D Communications: Challenges and Solutions 支持5G的D2D通信网络服务交付的安全性:挑战和解决方案
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-87166-6_1
Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo
{"title":"Security in Network Services Delivery for 5G Enabled D2D Communications: Challenges and Solutions","authors":"Ed Kamya Kiyemba Edris, Mahdi Aiash, J. Loo","doi":"10.1007/978-3-030-87166-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_1","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptographic Games 密码的游戏
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-46908-5_11
S. Rass, S. Schauer, Sandra König, Quanyan Zhu
{"title":"Cryptographic Games","authors":"S. Rass, S. Schauer, Sandra König, Quanyan Zhu","doi":"10.1007/978-3-030-46908-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-46908-5_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management 航空网络安全和网络弹性:空中交通管理风险评估
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_13
Georgia Lykou, George Iakovakis, D. Gritzalis
{"title":"Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management","authors":"Georgia Lykou, George Iakovakis, D. Gritzalis","doi":"10.1007/978-3-030-00024-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_13","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132109259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Blockchain and Other Emerging Technologies for Digital Business Strategies b区块链和其他用于数字业务战略的新兴技术
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-98225-6
{"title":"Blockchain and Other Emerging Technologies for Digital Business Strategies","authors":"","doi":"10.1007/978-3-030-98225-6","DOIUrl":"https://doi.org/10.1007/978-3-030-98225-6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable Approaches for the Treatment of Industrial Wastewater Using Metal-Organic Frame Works 金属有机框架工程处理工业废水的可持续方法
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-76008-3_20
Madhavi Konni, Saratchandra Babu Mukkamala, R. Vemuri, Manoj Kumar Karnena
{"title":"Sustainable Approaches for the Treatment of Industrial Wastewater Using Metal-Organic Frame Works","authors":"Madhavi Konni, Saratchandra Babu Mukkamala, R. Vemuri, Manoj Kumar Karnena","doi":"10.1007/978-3-030-76008-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-76008-3_20","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132960930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信