Encyclopedia of Cryptography, Security and Privacy最新文献

筛选
英文 中文
Machine Learning for Network Intrusion Detection 网络入侵检测的机器学习
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1631-1
Zonghua Zhang
{"title":"Machine Learning for Network Intrusion Detection","authors":"Zonghua Zhang","doi":"10.1007/978-3-642-27739-9_1631-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1631-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130349941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Capability Maturity Model 安全能力成熟度模型
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1678-1
Ludwig Englbrecht
{"title":"Security Capability Maturity Model","authors":"Ludwig Englbrecht","doi":"10.1007/978-3-642-27739-9_1678-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1678-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Persuasive Security Messages 有说服力的保安讯息
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1588-1
Shan Xiao, Merrill Warkentin
{"title":"Persuasive Security Messages","authors":"Shan Xiao, Merrill Warkentin","doi":"10.1007/978-3-642-27739-9_1588-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1588-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"56 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120851574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Forensics for CPS CPS的网络取证
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1722-1
M. Conti, F. Turrin
{"title":"Cyber Forensics for CPS","authors":"M. Conti, F. Turrin","doi":"10.1007/978-3-642-27739-9_1722-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1722-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometric Authentication 生物认证技术。
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_775-2
N. Subramanian
{"title":"Biometric Authentication","authors":"N. Subramanian","doi":"10.1007/978-3-642-27739-9_775-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_775-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134014223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economics of Surveillance 监控经济学
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1611-1
Carly Beckerman, Julian S. Williams
{"title":"Economics of Surveillance","authors":"Carly Beckerman, Julian S. Williams","doi":"10.1007/978-3-642-27739-9_1611-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1611-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130852967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authorizations 授权
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_810-2
S. De Capitani di Vimercati
{"title":"Authorizations","authors":"S. De Capitani di Vimercati","doi":"10.1007/978-3-642-27739-9_810-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_810-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber-Insurance: Past, Present and Future 网络保险:过去、现在和未来
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1624-1
S. Panda, Aristeidis Farao, E. Panaousis, C. Xenakis
{"title":"Cyber-Insurance: Past, Present and Future","authors":"S. Panda, Aristeidis Farao, E. Panaousis, C. Xenakis","doi":"10.1007/978-3-642-27739-9_1624-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1624-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133709508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Elliptic Curve Discrete Logarithm Problem 椭圆曲线离散对数问题
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_132
D. Hankerson, Alfred Menezes
{"title":"Elliptic Curve Discrete Logarithm Problem","authors":"D. Hankerson, Alfred Menezes","doi":"10.1007/0-387-23483-7_132","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_132","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Threat Intelligence 网络威胁情报
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1716-1
Daniel Schlette
{"title":"Cyber Threat Intelligence","authors":"Daniel Schlette","doi":"10.1007/978-3-642-27739-9_1716-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1716-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信