Search alternatives:
"regularly" » "regular"

1
by Windham, K. Matthew
Published 2018
SAS Institute
Table of Contents: ... and Data; SAS University Edition; Acknowledgments; Chapter 1: Getting Started with Regular Expressions...

2
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

3
Published 2020
Springer International Publishing
Table of Contents: ...DETIPS 2020: Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital...

4
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber...

5
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Security -- Building a Cryptovirus Using Microsoft’s Cryptographic API -- On the Security of the WinRAR...

6
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues...

7
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

8
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...

9
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

10
by Babbin, Jacob
Published 2006
Syngress
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

11
Published 2021
Springer International Publishing
Table of Contents: ... Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled...

12
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

13
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable...

14
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...CSS 2012 Regular Papers -- Session 1: Mobile Security -- Identity and Its Authentication Protocol...

15
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...

16
Published 2019
Springer International Publishing
Table of Contents: ... for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data...

17
Published 2021
Springer International Publishing
Table of Contents: ... Hyperactivity Disorder with Laplacian Regularization --...

18
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning -- System Security: Malware...

19
by Vehent, Julien
Published 2018
Manning Publications
Table of Contents: ... -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security...

20
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault...