Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2015
Springer International Publishing
Table of Contents: ...Data privacy management -- Autonomous and spontaneous security -- Quantitative aspects in security...

2
Published 2019
Springer International Publishing
Table of Contents: ...Mobile security -- Cloud security and big data -- IoT security -- Software security, malware...

3
Published 2015
Springer International Publishing
Table of Contents: ...Privacy -- Software security and malware analysis -- Network security and protocols -- Access...

4
Published 2014
Springer International Publishing
Table of Contents: ... -- Model-Based Specification and Validation of Security and Dependability Patterns -- Enforcing Information...

5
Published 2016
Springer International Publishing
Table of Contents: ...RFID, sensors and secure computation -- Security policies and biometrics -- Evaluation of protocols...

6
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Security -- Policy Administration in Tag-Based Authorization -- Enabling Dynamic Security Policy...

7
Published 2016
Springer International Publishing
Subjects: ...Data and Information Security...

8
Published 2021
Springer International Publishing
Table of Contents: ... Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs...

9
Published 2021
Springer International Publishing
Table of Contents: ... Threat Hunting -- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management...

10
Published 2021
Springer International Publishing
Table of Contents: ... on DistilBERT and Double-SN-LSTM for text analysis -- ePayment Security 31 An Empirical Study on Mobile Payment...

11
Published 2011
Springer Berlin Heidelberg
...Security and Cryptology...

12
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... in Extended Role Based Access Control Model -- Autonomous and Spontaneous Security -- Dynamic Security Rules...

13
Published 2014
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

14
Published 2012
Springer Berlin Heidelberg
...Security and Cryptology...

16
Published 2019
Springer International Publishing
Table of Contents: ... -- User Perceptions of Security and Usability of Mobile-based Single Password Authentication and Two...

17
Published 2012
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

19
Published 2016
Springer International Publishing
Table of Contents: ...Systems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis...

20
Published 2017
Springer International Publishing
Table of Contents: ... Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure...