Computer and Cyber Security最新文献

筛选
英文 中文
Applications of Digital Signatures in Cryptography 数字签名在密码学中的应用
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-18
Sarvesh Tanwar, A. Verma
{"title":"Applications of Digital Signatures in Cryptography","authors":"Sarvesh Tanwar, A. Verma","doi":"10.1201/9780429424878-18","DOIUrl":"https://doi.org/10.1201/9780429424878-18","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime 身份盗窃、恶意软件和处理网络犯罪的社会工程
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-24
Anupama Mishra, B. Gupta, Deepak Gupta
{"title":"Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime","authors":"Anupama Mishra, B. Gupta, Deepak Gupta","doi":"10.1201/9780429424878-24","DOIUrl":"https://doi.org/10.1201/9780429424878-24","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks 移动Ad Hoc网络中的安全与容错计算
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-17
Parmeet Kaur, Awadhesh Kumar Singh
{"title":"Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks","authors":"Parmeet Kaur, Awadhesh Kumar Singh","doi":"10.1201/9780429424878-17","DOIUrl":"https://doi.org/10.1201/9780429424878-17","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132376085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures 软件定义网络(SDN)在物联网安全中的作用:攻击与对策
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-21
Megha Quamara, B. Gupta
{"title":"Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures","authors":"Megha Quamara, B. Gupta","doi":"10.1201/9780429424878-21","DOIUrl":"https://doi.org/10.1201/9780429424878-21","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues 解决云计算安全、隐私和信任问题的密码学
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-11
Mustapha Hedabou
{"title":"Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues","authors":"Mustapha Hedabou","doi":"10.1201/9780429424878-11","DOIUrl":"https://doi.org/10.1201/9780429424878-11","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Medical Image Enhancement Techniques: A Survey 医学图像增强技术综述
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-12
S. Maharajan, S. P. Ghrera, Ashutosh Kumar Singh, S. Sahu
{"title":"Medical Image Enhancement Techniques: A Survey","authors":"S. Maharajan, S. P. Ghrera, Ashutosh Kumar Singh, S. Sahu","doi":"10.1201/9780429424878-12","DOIUrl":"https://doi.org/10.1201/9780429424878-12","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port 关键基础设施保护:港口网络安全,迈向混合港口
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-2
Andrea Chiappetta
{"title":"Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port","authors":"Andrea Chiappetta","doi":"10.1201/9780429424878-2","DOIUrl":"https://doi.org/10.1201/9780429424878-2","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Wireless LAN (WLAN) and WiMAX Systems 无线局域网(WLAN)和WiMAX系统的安全性
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-8
Shashank Gupta, B. Gupta
{"title":"Security in Wireless LAN (WLAN) and WiMAX Systems","authors":"Shashank Gupta, B. Gupta","doi":"10.1201/9780429424878-8","DOIUrl":"https://doi.org/10.1201/9780429424878-8","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126590014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric-Based Authentication in Cloud Computing 云计算中基于生物特征的认证
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-6
P. Saini, Awadhesh Kumar Singh
{"title":"Biometric-Based Authentication in Cloud Computing","authors":"P. Saini, Awadhesh Kumar Singh","doi":"10.1201/9780429424878-6","DOIUrl":"https://doi.org/10.1201/9780429424878-6","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134307866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Various Trust Computation Methods: A Step toward Secure FANETs 各种信任计算方法的分析:迈向安全网的一步
Computer and Cyber Security Pub Date : 2018-11-19 DOI: 10.1201/9780429424878-7
Kuldeep Singh, A. Verma, Palvi Aggarwal
{"title":"Analysis of Various Trust Computation Methods: A Step toward Secure FANETs","authors":"Kuldeep Singh, A. Verma, Palvi Aggarwal","doi":"10.1201/9780429424878-7","DOIUrl":"https://doi.org/10.1201/9780429424878-7","url":null,"abstract":"","PeriodicalId":318481,"journal":{"name":"Computer and Cyber Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信