1
Published 2022
Springer International Publishing
Table of Contents: ...Cryptography -- Authentication -- Privacy and Anonymity -- Attacks and Vulnerability Analysis...

2
Published 2014
Springer New York
Table of Contents: ... in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud...

3
Published 2018
Springer International Publishing
Table of Contents: ... Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero...

4
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A...

5
Published 2003
Springer US
Table of Contents: ... -- Concerning Enterprise Network Vulnerability to HTTP Tunneling -- Providing Voice Privacy Over Public Switched...

6
Published 2008
Springer US
Table of Contents: ... -- Software Licence Protection and Management for Organisations -- A Vulnerability Prioritization System Using...