Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 2005
Springer Berlin Heidelberg
Table of Contents: ...Event Detection in Multilevel Secure Active Databases -- Key Management for Multicast...

2
Published 2011
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

3
Published 2016
Springer International Publishing
Table of Contents: ...Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec...

4
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...DeCore: Detecting Content Repurposing Attacks on Clients’ Systems -- Network Security – I...

5
Published 2015
Springer International Publishing
Table of Contents: ...Security and Privacy Services -- On Secrecy Amplification Protocols -- Privacy-respecting Auctions...

6
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...Intrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment...

7
Published 2004
Springer US
Table of Contents: ... -- Security and Differentiated Hotspot Services Through Policy-based Management Architecture -- Key Management...

8
Published 2004
Springer US
Table of Contents: ... to an International Doctoral Program -- A New Paradigm for Information Security Education at Doctoral Level -- Highly...

9
Published 2008
Springer US
Table of Contents: ...Using Virtualization to Create and Deploy Computer Security Lab Exercises -- DigForNet: Digital...

10
Published 1999
Springer US
Table of Contents: ...I Invited Talks -- 1 E-Commerce Security: No Silver Bullet -- 2 Technical Enforcement...

11
by Wang, Lingyu, Jajodia, Sushil, Singhal, Anoop
Published 2017
Springer International Publishing
Table of Contents: ...1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs...

12
Published 2004
Springer US
Table of Contents: ...Refereed papers -- Remote Integrity Checking -- Automated Checking of SAP Security Permisisons -- A...

13
Published 2007
Springer US
Table of Contents: ...Foundation -- Basic Security Concepts -- Access Control Policies and Languages in Open Environments...

14
Published 2020
Springer International Publishing
Table of Contents: ... framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms...

15
Published 1998
Springer US
Table of Contents: ... integrity constraints and security in real-time database systems -- 14 Assurance — what is it? -- Two...

16
Published 1997
Springer US
Table of Contents: ...One: IFIP TC-11 Working Group 11. 5: First Working Conference on Integrity and Internal Control...

17
by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014
Springer International Publishing
Subjects: ...Data and Information Security...

18
Published 2016
Springer International Publishing
Table of Contents: ...Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense -- Cyber Security Deception...

19
Published 2019
Springer International Publishing
Table of Contents: ... to Cyber-Security -- Game-Theoretic Approaches to Cyber-Security: Issues and Challenges and Results...

20
Published 2015
Springer International Publishing
Table of Contents: ... in Network Security -- Cyber Counterdeception: How to Detect Denial & Deception -- Automated Adversary...