Advanced Sciences and Technologies for Security Applications最新文献

筛选
英文 中文
Cybersecurity and Secure Information Systems 网络安全和安全信息系统
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-16837-7
A. Masys, A. Hassanien, M. Elhoseny
{"title":"Cybersecurity and Secure Information Systems","authors":"A. Masys, A. Hassanien, M. Elhoseny","doi":"10.1007/978-3-030-16837-7","DOIUrl":"https://doi.org/10.1007/978-3-030-16837-7","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Interconnection of IT-OT Networks in Industry 4.0 工业4.0下IT-OT网络的安全互联
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-00024-0_11
Cristina Alcaraz
{"title":"Secure Interconnection of IT-OT Networks in Industry 4.0","authors":"Cristina Alcaraz","doi":"10.1007/978-3-030-00024-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-00024-0_11","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sensemaking Under Conditions of Extreme Uncertainty: From Observation to Action 极端不确定条件下的意义生成:从观察到行动
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-71998-2_3
Christian O. Fjäder
{"title":"Sensemaking Under Conditions of Extreme Uncertainty: From Observation to Action","authors":"Christian O. Fjäder","doi":"10.1007/978-3-030-71998-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-71998-2_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Internet 量子网络
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-72721-5_6
A. Lele
{"title":"Quantum Internet","authors":"A. Lele","doi":"10.1007/978-3-030-72721-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-72721-5_6","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124847905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Challenges in Maritime Security 海上安全面临的全球性挑战
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1049/etr.2012.9005
{"title":"Global Challenges in Maritime Security","authors":"","doi":"10.1049/etr.2012.9005","DOIUrl":"https://doi.org/10.1049/etr.2012.9005","url":null,"abstract":"Although piracy attacks off Somalia may be abating, there is no decline in sea terrorism worldwide. On the contrary, our sea trade routes may never have been more vulnerable and threat to economies through disruption of maritime lines of supply never more relevant. Over 50,000 merchant ships ply the seven seas. ISO container traffic is more or less back to previous levels. There are more than 200 million container movements involving the USA alone. And world sea trade is expected to increase significantly over the next few years.","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129933967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat 恐怖主义与物联网:网络恐怖主义作为一种新兴威胁
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-90221-6_5
Adam Henschke
{"title":"Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat","authors":"Adam Henschke","doi":"10.1007/978-3-030-90221-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-90221-6_5","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain and Clinical Trial 区块链与临床试验
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-11289-9
Jamal, G. Epiphaniou, Haider M. Al-Khateeb, Blockchain
{"title":"Blockchain and Clinical Trial","authors":"Jamal, G. Epiphaniou, Haider M. Al-Khateeb, Blockchain","doi":"10.1007/978-3-030-11289-9","DOIUrl":"https://doi.org/10.1007/978-3-030-11289-9","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards an IoT Community-Cluster Model for Burglar Intrusion Detection and Real-Time Reporting in Smart Homes 面向智能家居防盗入侵检测和实时报告的物联网社区集群模型
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-87166-6_3
Ryan Singh, Haider M. Al-Khateeb, Gabriela Ahmadi-Assalemi, G. Epiphaniou
{"title":"Towards an IoT Community-Cluster Model for Burglar Intrusion Detection and Real-Time Reporting in Smart Homes","authors":"Ryan Singh, Haider M. Al-Khateeb, Gabriela Ahmadi-Assalemi, G. Epiphaniou","doi":"10.1007/978-3-030-87166-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-87166-6_3","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence, Its Applications in Different Sectors and Challenges: Bangladesh Context 人工智能及其在不同领域的应用和挑战:孟加拉国背景
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88040-8_4
Kudrat-E-Khuda (Babu)
{"title":"Artificial Intelligence, Its Applications in Different Sectors and Challenges: Bangladesh Context","authors":"Kudrat-E-Khuda (Babu)","doi":"10.1007/978-3-030-88040-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-88040-8_4","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insider Threat 内部威胁
Advanced Sciences and Technologies for Security Applications Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-35746-7_19
James Bore
{"title":"Insider Threat","authors":"James Bore","doi":"10.1007/978-3-030-35746-7_19","DOIUrl":"https://doi.org/10.1007/978-3-030-35746-7_19","url":null,"abstract":"","PeriodicalId":158863,"journal":{"name":"Advanced Sciences and Technologies for Security Applications","volume":"3 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132005974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信