Advances in Information Security, Privacy, and Ethics最新文献

筛选
英文 中文
Sensor Network Methodologies for Smart Applications 智能应用的传感器网络方法
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-4381-8
{"title":"Sensor Network Methodologies for Smart Applications","authors":"","doi":"10.4018/978-1-7998-4381-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-4381-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies 物联网、云和边缘计算技术对社会、法律和伦理的影响
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3817-3
{"title":"Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies","authors":"","doi":"10.4018/978-1-7998-3817-3","DOIUrl":"https://doi.org/10.4018/978-1-7998-3817-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121615036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy and Security Challenges in Location Aware Computing 位置感知计算中的隐私和安全挑战
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7756-1
{"title":"Privacy and Security Challenges in Location Aware Computing","authors":"","doi":"10.4018/978-1-7998-7756-1","DOIUrl":"https://doi.org/10.4018/978-1-7998-7756-1","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122331826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handbook of Research on Intelligent Data Processing and Information Security Systems 智能数据处理与信息安全系统研究手册
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1290-6
{"title":"Handbook of Research on Intelligent Data Processing and Information Security Systems","authors":"","doi":"10.4018/978-1-7998-1290-6","DOIUrl":"https://doi.org/10.4018/978-1-7998-1290-6","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133808594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Handbook of Research on Machine and Deep Learning Applications for Cyber Security 机器和深度学习在网络安全中的应用研究手册
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9611-0
{"title":"Handbook of Research on Machine and Deep Learning Applications for Cyber Security","authors":"","doi":"10.4018/978-1-5225-9611-0","DOIUrl":"https://doi.org/10.4018/978-1-5225-9611-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revolutionary Applications of Blockchain-Enabled Privacy and Access Control 区块链支持的隐私和访问控制的革命性应用
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7589-5
{"title":"Revolutionary Applications of Blockchain-Enabled Privacy and Access Control","authors":"","doi":"10.4018/978-1-7998-7589-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7589-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic 网络安全危机管理和COVID-19大流行的经验教训
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-9164-2
{"title":"Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic","authors":"","doi":"10.4018/978-1-7998-9164-2","DOIUrl":"https://doi.org/10.4018/978-1-7998-9164-2","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handbook of Research on Advancing Cybersecurity for Digital Transformation 推进数字化转型的网络安全研究手册
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7
{"title":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","authors":"","doi":"10.4018/978-1-7998-6975-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics 先进的方法和技术在系统安全,信息隐私和取证
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7492-7
M. Khosrow-Pour
{"title":"Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics","authors":"M. Khosrow-Pour","doi":"10.4018/978-1-5225-7492-7","DOIUrl":"https://doi.org/10.4018/978-1-5225-7492-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Large-Scale Data Streaming, Processing, and Blockchain Security 大规模数据流、处理和区块链安全
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3444-1
{"title":"Large-Scale Data Streaming, Processing, and Blockchain Security","authors":"","doi":"10.4018/978-1-7998-3444-1","DOIUrl":"https://doi.org/10.4018/978-1-7998-3444-1","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书