Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Hamed, Tarfa"'
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:99-120
Publikováno v:
In Computers & Security March 2018 73:137-155
Autor:
Balboni, Paolo, Barata, Martim Taborda, Basile, Cataldo, Bella, Giampaolo, Beuchelt, Gerald, Caballero, Albert, Capparelli, Francesco, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Curry, Samuel J.J., Dara, Rozita, Ellis, Scott R., Gross, William F., Jr., Gurkok, Cem, Hamed, Tarfa, Hao, Feng, Harmening, Jim, Hoffman, Rich, Huseynov, Emin, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Karunamoorthy, Aruna, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Kotapati, Kameswari, Kremer, Stefan C., Lancrenon, Jean, LaPorta, Thomas F., Lewis, Keith, Liu, Peng, Mansoor, Bill, Mims, Nailah A., Padmavathi, V., Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Saminathan, R., Santana, Mario D., Seigneur, Jean-Marc, Soper, Daniel S., Spies, Terence, Walker, Jesse, West, Michael A., Yan, Liang, Yee, George O.M., Zhao, Gansen
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xvii-xviii
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:109-130
Autor:
Hamed, Tarfa
Protecting the information on the Internet is a significant objective and this significance is increasing with time. The Internet experiences many attacks every day and that is attracting all participant parties to find a solution. One of the most co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______453::710d64492d08e2a21636e3a378cb72d4
https://hdl.handle.net/10214/10315
https://hdl.handle.net/10214/10315
Autor:
Amoroso, Edward G., Bardin, Jeffrey S., Basile, Cataldo, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Casalino, Matteo Maria, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Dara, Rozita, Day, Christopher, di Vimercati, Sabrina De Capitani, El Maliki, Tewfiq, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Genovese, Angelo, Granova, Anna, Gross, William F., Guan, Yong, Gurkok, Cem, Hao, Feng, Hamed, Tarfa, Harmening, James T., Hoffman, Rich, Huseynov, Emin, Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Korba, Larry, Kotapati, Kameswari, Kremer, Stefan C., LaPorta, Thomas F., Lencrenon, Jean, Lewis, Keith, Liu, Peng, Livraga, Giovanni, Mallery, John R., Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Mims, Nailah, Mutti, Simone, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Santambrogio, Marco, Santana, Mario, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, West, Michael A., Wing, Dan, Yee, George O.M., Yan, Liang, Zabicki, Roman, Zhao, Gansen, Zias, Zhe
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:xxvii-xxx
Publikováno v:
2015 International Conference on Computing, Networking & Communications (ICNC); 2015, p363-368, 6p
Publikováno v:
2014 13th International Conference on Machine Learning & Applications; 2014, p135-140, 6p