Advances in Information Security, Privacy, and Ethics最新文献

筛选
英文 中文
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks 无线传感器网络安全增强的深度学习策略
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5068-7
{"title":"Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks","authors":"","doi":"10.4018/978-1-7998-5068-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-5068-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130608821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure 云基础设施内部攻击的检测和缓解
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7924-3
{"title":"Detection and Mitigation of Insider Attacks in a Cloud Infrastructure","authors":"","doi":"10.4018/978-1-5225-7924-3","DOIUrl":"https://doi.org/10.4018/978-1-5225-7924-3","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Transformation and Challenges to Data Security and Privacy 数字化转型和对数据安全和隐私的挑战
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-4201-9
{"title":"Digital Transformation and Challenges to Data Security and Privacy","authors":"","doi":"10.4018/978-1-7998-4201-9","DOIUrl":"https://doi.org/10.4018/978-1-7998-4201-9","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NATO and the Future of European and Asian Security 北约与欧洲和亚洲安全的未来
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7118-7
{"title":"NATO and the Future of European and Asian Security","authors":"","doi":"10.4018/978-1-7998-7118-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-7118-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125776533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security 发展中国家的网络安全能力及其对全球安全的影响
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-8693-8
{"title":"Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security","authors":"","doi":"10.4018/978-1-7998-8693-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-8693-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Quantum Cryptography and the Future of Cyber Security 量子密码学与网络安全的未来
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2253-0
{"title":"Quantum Cryptography and the Future of Cyber Security","authors":"","doi":"10.4018/978-1-7998-2253-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-2253-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Blockchain Applications in IoT Security 区块链在物联网安全中的应用
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2414-5
{"title":"Blockchain Applications in IoT Security","authors":"","doi":"10.4018/978-1-7998-2414-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-2414-5","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115549554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps 在健康和健身移动应用程序上分享个人信息的隐私问题
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3487-8
{"title":"Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps","authors":"","doi":"10.4018/978-1-7998-3487-8","DOIUrl":"https://doi.org/10.4018/978-1-7998-3487-8","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Limitations and Future Applications of Quantum Cryptography 量子密码学的局限性和未来应用
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6677-0
{"title":"Limitations and Future Applications of Quantum Cryptography","authors":"","doi":"10.4018/978-1-7998-6677-0","DOIUrl":"https://doi.org/10.4018/978-1-7998-6677-0","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modern Principles, Practices, and Algorithms for Cloud Security 云安全的现代原则、实践和算法
Advances in Information Security, Privacy, and Ethics Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-1082-7
{"title":"Modern Principles, Practices, and Algorithms for Cloud Security","authors":"","doi":"10.4018/978-1-7998-1082-7","DOIUrl":"https://doi.org/10.4018/978-1-7998-1082-7","url":null,"abstract":"","PeriodicalId":302907,"journal":{"name":"Advances in Information Security, Privacy, and Ethics","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133125155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信