Search alternatives:
information malware » information aware, information margaret, information warfare
location awareness » situation awareness, location aware

1
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... for Location Privacy Aware Nearest-Neighbor Queries.- Semantic-Aware Obfuscation for Location Privacy...

2
Published 2023
Springer Nature Singapore
Table of Contents: ...: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided...

3
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Support for Designing Social Information Infrastructure -- Design and Implementation of a Context-Aware...

4
Published 2016
Springer Nature Singapore
Table of Contents: ... System.-Chapter 57. Process flow for Information Visualization in Biological Data -- Chapter 58. A...

5
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...: Response Time and Scalability -- Integration of Similar Location Based Services Proposed by Several...

6
Published 2021
Springer International Publishing
Table of Contents: ... -- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing...

7
Published 2014
Springer International Publishing
Table of Contents: ... -- On the usefulness of information hiding techniques for wireless sensor networks security -- Evaluation of Malware...

8
Published 2019
Springer International Publishing
Table of Contents: ... of Weighted Linear Dynamic Networks -- Privacy Protection for Context-Aware Services: A Two-Layer Three-Party...

9
Published 2017
Springer International Publishing
Table of Contents: ... in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management --...

10
Published 2020
Springer International Publishing
Table of Contents: ... S -- Detection Of Human Faces In Video Sequences Using Mean of GLBP Signatures -- Malware Family Classification...

11
by Roberts, Aaron
Published 2021
Apress
Table of Contents: ... -- Location -- Malware Analysis -- Note -- Observed Data -- Opinion -- Tool -- Relationship -- Sighting...

12
by Conrad, Eric, Misenar, Seth, Feldman, Joshua
Published 2023
Syngress
Table of Contents: ... of Duties -- Information Flow Model -- Chinese Wall Model -- Non-interference -- Take-Grant -- Access...

13
Published 2014
Springer Netherlands
Table of Contents: ...-Based Location of Mobile Devices; M.Guri, et al -- Platform design for data sharing; Y.-H. Son, et al...

14
Published 2020
Springer International Publishing
Table of Contents: ... Spectrum Sensing Based On Cascaded Approach for Cognitive Radio -- Chapter 46 Remote Process Monitoring...