Search alternatives:
information malware » information aware, information margaret, information warfare
software monitor » software monitoring, software mining, software manager
malware mobile » aware mobile, hardware mobile

1
Published 2024
Springer Nature Switzerland
Table of Contents: ... Information. -- Cyber Physical Systems and IoT. -- SecMonS: A Security Monitoring Framework for IEC 61850...

2
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Software Development Methods in the Internet of Things.- SAT–Based Bounded Strong Satisfiability...

3
Published 2014
Springer Berlin Heidelberg
Table of Contents: ... Monitoring -- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter...

4
Published 2015
Springer International Publishing
Table of Contents: ... as Incentive Mechanisms in Mobile Crowd Sensing -- Electrical Heart Signals can be Monitored from the Moon...

5
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Services; Y.Kim, et al -- Threat assessment model for mobile malware; T.van Do, et al --...

6
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Classification of Software Artifacts Based on Structural Information -- Clustering Client Honeypot...

7
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Surveillance and Monitoring -- Security and Quality of Service in Wireless Networks -- Software -- Low-Level...

8
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks...

9
Published 2020
Springer International Publishing
Table of Contents: ... -- Privacy CURE: Consent Comprehension Made Easy -- Detecting Malware and Software Weaknesses -- JavaScript...

10
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Networks -- Metadata Management in P2P over Mobile Ad Hoc Network -- Prediction of Network Delay...

11
Published 2022
Springer International Publishing
Table of Contents: ... techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto...

12
Published 2016
Springer Nature Singapore
Table of Contents: ... System.-Chapter 57. Process flow for Information Visualization in Biological Data -- Chapter 58. A...

13
Published 2022
Springer International Publishing
Table of Contents: ... Descriptor using Attention Mechanism -- Informative Software Defect Data Generation and Prediction: INF-SMOTE...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... of the GENEPI-ENTB Databank – System Overview -- Monitoring Malware Activity on the LAN Network -- Using Mobile...

15
Published 2020
Springer International Publishing
Table of Contents: ... with Patients’ Statement: An Advanced Disease Diagnosis Technique -- Non-Invasive Diabetes Level Monitoring...

16
Published 2023
Springer Nature Switzerland
Table of Contents: ... ANALYSIS AND MONITORING --...

17
Published 2015
Springer International Publishing
Table of Contents: ...Monitoring Checklist for Ceph Object Storage Infrastructure -- Towards a Formalization of Real-Time...

18
Published 2019
Springer International Publishing
Table of Contents: ... Channel becomes Good: Kernel Malware Attack Investigation -- Robust Encrypted Watermarking for Medical...

19
Published 2017
Springer International Publishing
Table of Contents: ... by Compressive Sensing -- An Inside Look at IoT Malware -- Design of OPC/DDP-Based Remote Monitoring System...

20
Published 2021
Springer International Publishing
Table of Contents: ... Convolutional Neural Network for Malware Detection: A Visual Classification Approach -- Mobile Agent Security...