1
by Fernandes, Fábio A. O., Alves de Sousa, Ricardo J., Ptak, Mariusz
Published 2018
Springer International Publishing
Table of Contents: ... head model -- 2.1 Introduction -- 2.2 Methods and Materials -- References -- 3 Validation of YEAHM...

2
Published 2020
Springer International Publishing
Table of Contents: .... Vulnerability -- Chapter 16. Cyber Laws -- Chapter 17. Cyber Crime -- Chapter 18. Homeland Security -- Chapter...

3
by Hong, Y.-W. Peter, Lan, Pang-Chang, Kuo, C.-C. Jay
Published 2014
Springer Nature Singapore
... years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping...

4
Published 2022
Springer International Publishing
Table of Contents: ...-SecurityVulnerabilities in Approximate Circuits -- 12-Voltage Overscaling Techniques for Security Applications -- 13...

5
Published 2020
Springer International Publishing
... in cybersecurity. It analyzes how the human vulnerabilities can be exploited by cybercriminals and proposes methods...