{"title":"Enabling Blockchain Technology for Secure Networking and Communications","authors":"","doi":"10.4018/978-1-7998-5839-3","DOIUrl":"https://doi.org/10.4018/978-1-7998-5839-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handbook of Research on Intrusion Detection Systems","authors":"","doi":"10.4018/978-1-7998-2242-4","DOIUrl":"https://doi.org/10.4018/978-1-7998-2242-4","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125844907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transdisciplinary Perspectives on Risk Management and Cyber Intelligence","authors":"","doi":"10.4018/978-1-7998-4339-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-4339-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security, Privacy, and Forensics Issues in Big Data","authors":"","doi":"10.4018/978-1-5225-9742-1","DOIUrl":"https://doi.org/10.4018/978-1-5225-9742-1","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132085583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handbook of Research on Cyber Crime and Information Privacy","authors":"","doi":"10.4018/978-1-7998-5728-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Malware and Data-Driven Network Security","authors":"","doi":"10.4018/978-1-7998-7789-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-7789-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidisciplinary Approaches to Ethics in the Digital Era","authors":"","doi":"10.4018/978-1-7998-4117-3","DOIUrl":"https://doi.org/10.4018/978-1-7998-4117-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidisciplinary Approach to Modern Digital Steganography","authors":"","doi":"10.4018/978-1-7998-7160-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-7160-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic Security Solutions for the Internet of Things","authors":"","doi":"10.4018/978-1-5225-5742-5","DOIUrl":"https://doi.org/10.4018/978-1-5225-5742-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124416118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security of Industrial Control Systems in the Future Internet Environment","authors":"","doi":"10.4018/978-1-7998-2910-2","DOIUrl":"https://doi.org/10.4018/978-1-7998-2910-2","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}