Search alternatives:
"regularity" » "regularly"

21
Published 2019
Springer International Publishing
Table of Contents: ... for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data...

22
Published 2021
Springer International Publishing
Table of Contents: ... Hyperactivity Disorder with Laplacian Regularization --...

23
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning -- System Security: Malware...

24
by Binnie, Chris, McCune, Rory
Published 2021
John Wiley & Sons
Table of Contents: ... Security Settings 229 -- Automated S3 Attacks 231 -- Storage Hunting 234 -- Summary 236 -- Part IV Advanced...

25
by Vehent, Julien
Published 2018
Manning Publications
Table of Contents: ... -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security...

26
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault...

27
Published 2020
Springer International Publishing
Table of Contents: ... -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against...

28
Published 2021
Springer International Publishing
Subjects: ...Data and Information Security...

29
Published 2023
Springer Nature Switzerland
Table of Contents: ...Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind...

30
Published 2017
Springer International Publishing
Table of Contents: ...Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics...

31
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol...

32
Published 2024
Springer Nature Switzerland
Table of Contents: ... for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security...

33
Published 2013
Springer International Publishing
Table of Contents: ...System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization...

34
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

35
by Arnett, George W.
Published 2011
John Wiley & Sons
Table of Contents: ... of the World Markets -- Transfer of Securities and Perfection of Collateral -- Margin -- Short Selling...

36
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes -- Quantum...

37
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...) to MLP (Machine Language Processing) -- Security of Multi-agent Systems and Software Protection -- Secure...

38
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Security Policy Model and Its Realization Mechanism -- Packet Marking Based Cooperative Attack Response...

39
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining...

40
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable...