Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Leonard Popyack"'
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. The 12 revised full papers, 13
Autor:
HASELWARTER, PHILIPP G.1 philipp@haselwarter.org, RIVAS, EXEQUIEL2 erivas@dcc.fceia.unr.edu.ar, VAN MUYLDER, ANTOINE3 antoine.vanmuylder@kuleuven.be, WINTERHALTER, THÉO4 theo.winterhalter@mpi-sp.org, ABATE, CARMINE4 carmine.abate@mpi-sp.org, SIDORENCO, NIKOLAJ1 sidorenco@cs.au.dk, HRIŢCU, CĂTĂLIN4 catalin.hritcu@mpi-sp.org, MAILLARD, KENJI5 kenji.maillard@inria.fr, SPITTERS, BAS1 spitters@cs.au.dk
Publikováno v:
ACM Transactions on Programming Languages & Systems. Sep2023, Vol. 45 Issue 3, p1-61. 61p.
Autor:
MITCHELL, ROBERT1 rrmitche@vt.edu, CHEN, ING-RAY1 irchen@vt.edu
Publikováno v:
ACM Computing Surveys. Apr2014, Vol. 46 Issue 4, p55:1-55:29. 29p. 3 Diagrams, 6 Charts.
Autor:
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yang, Christopher C., Zeng, Daniel, Chau, Michael, Kuiyu Chang, Qing Yang
Publikováno v:
Intelligence & Security Informatics (9783540715481); 2007, p141-151, 11p
Publikováno v:
2006 IEEE International Conference on Communications; 2006, p2394-2400, 7p
Autor:
Jiong Zhang, Mohammad Zulkernine
Publikováno v:
2006 IEEE International Conference on Communications; 2006, p2388-2393, 6p
Autor:
Guoying Wang, Peters, James F., Skowron, Andrzej, Yiyu Yao, Dan Li, Kefei Wang, Deogun, Jitender S.
Publikováno v:
Rough Sets & Knowledge Technology; 2006, p792-798, 7p
Autor:
Zhang, J., Zulkernine, M.
Publikováno v:
First International Conference on Availability, Reliability & Security (ARES'06); 2006, p8-8, 1p
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysi