Advances in Information Security, Privacy, and Ethics最新文献

筛选
英文 中文
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World 现代世界中技术、隐私和安全挑战研究手册
Advances in Information Security, Privacy, and Ethics Pub Date : 2022-06-30 DOI: 10.4018/978-1-6684-5250-9
{"title":"Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World","authors":"","doi":"10.4018/978-1-6684-5250-9","DOIUrl":"https://doi.org/10.4018/978-1-6684-5250-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cross-Industry Applications of Cyber Security Frameworks 网络安全框架的跨行业应用
Advances in Information Security, Privacy, and Ethics Pub Date : 2022-06-24 DOI: 10.4018/978-1-6684-3448-2
{"title":"Cross-Industry Applications of Cyber Security Frameworks","authors":"","doi":"10.4018/978-1-6684-3448-2","DOIUrl":"https://doi.org/10.4018/978-1-6684-3448-2","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115500504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity 机器学习和深度学习在隐私和网络安全中的应用
Advances in Information Security, Privacy, and Ethics Pub Date : 2022-06-24 DOI: 10.4018/978-1-7998-9430-8
{"title":"Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity","authors":"","doi":"10.4018/978-1-7998-9430-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-9430-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics 网络安全情报与分析的方法、实现与应用
Advances in Information Security, Privacy, and Ethics Pub Date : 2022-06-17 DOI: 10.4018/978-1-6684-3991-3
{"title":"Methods, Implementation, and Application of Cyber Security Intelligence and Analytics","authors":"","doi":"10.4018/978-1-6684-3991-3","DOIUrl":"https://doi.org/10.4018/978-1-6684-3991-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Global Perspectives on Information Security Regulations 信息安全法规的全球视角
Advances in Information Security, Privacy, and Ethics Pub Date : 2022-05-27 DOI: 10.4018/978-1-7998-8390-6
{"title":"Global Perspectives on Information Security Regulations","authors":"","doi":"10.4018/978-1-7998-8390-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-8390-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Education for Awareness and Compliance 网络安全意识和合规教育
Advances in Information Security, Privacy, and Ethics Pub Date : 2019-02-22 DOI: 10.4018/978-1-5225-7847-5
Ismini Vasileiou, S. Furnell
{"title":"Cybersecurity Education for Awareness and Compliance","authors":"Ismini Vasileiou, S. Furnell","doi":"10.4018/978-1-5225-7847-5","DOIUrl":"https://doi.org/10.4018/978-1-5225-7847-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"18 70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Developments in Information Security and Cybernetic Wars 信息安全和控制论战争的发展
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-8304-2
Muhammad Sarfraz
{"title":"Developments in Information Security and Cybernetic Wars","authors":"Muhammad Sarfraz","doi":"10.4018/978-1-5225-8304-2","DOIUrl":"https://doi.org/10.4018/978-1-5225-8304-2","url":null,"abstract":"Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals.","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security and Privacy Issues in Sensor Networks and IoT 传感器网络和物联网中的安全和隐私问题
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-0373-7
{"title":"Security and Privacy Issues in Sensor Networks and IoT","authors":"","doi":"10.4018/978-1-7998-0373-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-0373-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modern Theories and Practices for Cyber Ethics and Security Compliance 网络伦理与安全合规的现代理论与实践
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3149-5
{"title":"Modern Theories and Practices for Cyber Ethics and Security Compliance","authors":"","doi":"10.4018/978-1-7998-3149-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-3149-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115441033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advanced Digital Image Steganography Using LSB, PVD, and EMD 使用LSB, PVD和EMD的高级数字图像隐写术
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7516-0
Gandharba Swain
{"title":"Advanced Digital Image Steganography Using LSB, PVD, and EMD","authors":"Gandharba Swain","doi":"10.4018/978-1-5225-7516-0","DOIUrl":"https://doi.org/10.4018/978-1-5225-7516-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115905581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信