Search alternatives:
"secularity" » "peculiarity", "secularism"
"regularity" » "regularly"

21
Published 2016
Springer International Publishing
Table of Contents: ... Information Networks Bi-clustering with Similarity Regularization -- A Profile-Based Authorship Attribution...

22
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Address -- A: The Environment and Security Nexus -- Environment and Security in International Politics...

23
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Keynotes -- Keynotes -- WiFi and RF Security -- A Scalable Wireless Routing Protocol Secure against...

24
Published 2021
Springer International Publishing
Table of Contents: ... Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled...

25
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...CSS 2012 Regular Papers -- Session 1: Mobile Security -- Identity and Its Authentication Protocol...

26
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...

27
Published 2019
Springer International Publishing
Table of Contents: ... for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data...

28
Published 2021
Springer International Publishing
Table of Contents: ... Hyperactivity Disorder with Laplacian Regularization --...

29
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning -- System Security: Malware...

30
by Binnie, Chris, McCune, Rory
Published 2021
John Wiley & Sons
Table of Contents: ... Security Settings 229 -- Automated S3 Attacks 231 -- Storage Hunting 234 -- Summary 236 -- Part IV Advanced...

31
by Vehent, Julien
Published 2018
Manning Publications
Table of Contents: ... -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security...

32
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault...

33
Published 2021
Springer International Publishing
Subjects: ...Data and Information Security...

34
Published 2023
Springer Nature Switzerland
Table of Contents: ...Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind...

35
Published 2020
Springer International Publishing
Table of Contents: ... -- Reliability and Security for Safety-Critical Service Compositions -- AI/ML in Security -- A Defence Against...

36
Published 2017
Springer International Publishing
Table of Contents: ...Malware and Anomaly Detection -- Intrusion Response -- Vulnerability Analysis and Security Metrics...

37
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol...

38
Published 2024
Springer Nature Switzerland
Table of Contents: ... for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security...

39
Published 2024
Springer Nature Switzerland
Table of Contents: ... Security: A Privacy-Aware Crowd-Sourcing Approach -- Comparative Analysis of Reduction Methods...

40
Published 2013
Springer International Publishing
Table of Contents: ...System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization...