ICGS3/e-Democracy最新文献

筛选
英文 中文
Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining 面向最大熵的隐私保护数据挖掘匿名化算法
ICGS3/e-Democracy Pub Date : 2012-10-08 DOI: 10.1007/978-3-642-33448-1_2
Stergios G. Tsiafoulis, V. Zorkadis, E. Pimenidis
{"title":"Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining","authors":"Stergios G. Tsiafoulis, V. Zorkadis, E. Pimenidis","doi":"10.1007/978-3-642-33448-1_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_2","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Evolution of Malware Species 关于恶意软件物种的进化
ICGS3/e-Democracy Pub Date : 2012-10-08 DOI: 10.1007/978-3-642-33448-1_8
V. Vlachos, C. Ilioudis, A. Papanikolaou
{"title":"On the Evolution of Malware Species","authors":"V. Vlachos, C. Ilioudis, A. Papanikolaou","doi":"10.1007/978-3-642-33448-1_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_8","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Genre-Based Information Hiding 基于类型的信息隐藏
ICGS3/e-Democracy Pub Date : 2012-09-12 DOI: 10.1007/978-3-642-33448-1_15
Russell Ogilvie, G. Weir
{"title":"Genre-Based Information Hiding","authors":"Russell Ogilvie, G. Weir","doi":"10.1007/978-3-642-33448-1_15","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_15","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Situational Awareness Architecture for the Smart Grid 面向智能电网的态势感知体系结构
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_31
Anastasia Mavridou, M. Papa
{"title":"A Situational Awareness Architecture for the Smart Grid","authors":"Anastasia Mavridou, M. Papa","doi":"10.1007/978-3-642-33448-1_31","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_31","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Securing Transportation-Critical Infrastructures: Trends and Perspectives 保障交通关键基础设施:趋势和前景
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_24
M. Theoharidou, Miltiadis Kandias, D. Gritzalis
{"title":"Securing Transportation-Critical Infrastructures: Trends and Perspectives","authors":"M. Theoharidou, Miltiadis Kandias, D. Gritzalis","doi":"10.1007/978-3-642-33448-1_24","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_24","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags RFID标签安全组所有权传输协议的密码分析与改进
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_26
H. Jannati, A. Falahati
{"title":"Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags","authors":"H. Jannati, A. Falahati","doi":"10.1007/978-3-642-33448-1_26","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_26","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Practical Password Harvesting from Volatile Memory 从易失性存储器中获取实用密码
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_3
Stavroula Karayianni, Vasilios Katos
{"title":"Practical Password Harvesting from Volatile Memory","authors":"Stavroula Karayianni, Vasilios Katos","doi":"10.1007/978-3-642-33448-1_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_3","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Deployment of Artificial Immune Systems for Biometrics 人工免疫系统在生物识别中的应用研究
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_18
R. Krishnamurthy, K. Revett, H. Jahankhani
{"title":"On the Deployment of Artificial Immune Systems for Biometrics","authors":"R. Krishnamurthy, K. Revett, H. Jahankhani","doi":"10.1007/978-3-642-33448-1_18","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_18","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Awareness on Fake Websites and Detecting Techniques 提高对虚假网站的认识和检测技术
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_36
H. Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw
{"title":"Improved Awareness on Fake Websites and Detecting Techniques","authors":"H. Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw","doi":"10.1007/978-3-642-33448-1_36","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_36","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125453847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyzing the Economic Impacts of Security Breaches Due to Outsourcing 分析外包导致的安全漏洞的经济影响
ICGS3/e-Democracy Pub Date : 2011-08-24 DOI: 10.1007/978-3-642-33448-1_22
Dimitrios Koumaridis, Emmanouil Stiakakis, C. Georgiadis
{"title":"Analyzing the Economic Impacts of Security Breaches Due to Outsourcing","authors":"Dimitrios Koumaridis, Emmanouil Stiakakis, C. Georgiadis","doi":"10.1007/978-3-642-33448-1_22","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_22","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信