Proceedings of the 3rd international conference on Security of information and networks最新文献

筛选
英文 中文
Session details: Keynote session 2 会议详情:主题演讲2
M. Anikeev
{"title":"Session details: Keynote session 2","authors":"M. Anikeev","doi":"10.1145/3254484","DOIUrl":"https://doi.org/10.1145/3254484","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SI.2: management and models of security and integrity 会话详细信息:SI.2:安全性和完整性的管理和模型
Takeshi Takahashi
{"title":"Session details: SI.2: management and models of security and integrity","authors":"Takeshi Takahashi","doi":"10.1145/3254489","DOIUrl":"https://doi.org/10.1145/3254489","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Keynote session 1 会议详情:主题演讲1
Atilla Elçi
{"title":"Session details: Keynote session 1","authors":"Atilla Elçi","doi":"10.1145/3265845.3287618","DOIUrl":"https://doi.org/10.1145/3265845.3287618","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: CS.2: cryptography, security and networks 会话详细信息:CS.2:密码学、安全性和网络
Lyudmila Babenko
{"title":"Session details: CS.2: cryptography, security and networks","authors":"Lyudmila Babenko","doi":"10.1145/3254492","DOIUrl":"https://doi.org/10.1145/3254492","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127263669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: CS.3: cryptography, security and networks 会话详细信息:CS.3:密码学、安全性和网络
S. Gharout
{"title":"Session details: CS.3: cryptography, security and networks","authors":"S. Gharout","doi":"10.1145/3254493","DOIUrl":"https://doi.org/10.1145/3254493","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122358701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SI.1: management and models of security and integrity 会话详细信息:SI.1:安全性和完整性的管理和模型
M. Kalinin
{"title":"Session details: SI.1: management and models of security and integrity","authors":"M. Kalinin","doi":"10.1145/3254488","DOIUrl":"https://doi.org/10.1145/3254488","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: AI.1: attacks and intrusion detection 会话详细信息如下:AI.1:攻击和入侵检测
V. Laxmi
{"title":"Session details: AI.1: attacks and intrusion detection","authors":"V. Laxmi","doi":"10.1145/3254494","DOIUrl":"https://doi.org/10.1145/3254494","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: CS.1: cryptography, security and networks 会话详细信息:CS.1:密码学、安全和网络
J. Pieprzyk
{"title":"Session details: CS.1: cryptography, security and networks","authors":"J. Pieprzyk","doi":"10.1145/3254491","DOIUrl":"https://doi.org/10.1145/3254491","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SA.1: security assessment, policies, privacy, and educational programs 会话详细信息:SA.1:安全评估、策略、隐私和教育计划
A. Chefranov
{"title":"Session details: SA.1: security assessment, policies, privacy, and educational programs","authors":"A. Chefranov","doi":"10.1145/3254485","DOIUrl":"https://doi.org/10.1145/3254485","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SA.3: security assessment, policies, privacy, and educational programs 会话详细信息:SA.3:安全评估、策略、隐私和教育计划
A. Basan
{"title":"Session details: SA.3: security assessment, policies, privacy, and educational programs","authors":"A. Basan","doi":"10.1145/3254487","DOIUrl":"https://doi.org/10.1145/3254487","url":null,"abstract":"","PeriodicalId":425499,"journal":{"name":"Proceedings of the 3rd international conference on Security of information and networks","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信