181
Published 2021
Springer International Publishing
Table of Contents: ... Threat Hunting -- SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management...

182
Published 2020
Springer International Publishing
Table of Contents: ... -- TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning -- A Brokerage Approach for Secure...

183
Published 2021
Springer International Publishing
Table of Contents: ... and Reverse for Weak Measurements Resilient QKD and Securing Entanglement -- Warped Input Gaussian Processes...

184
by Neshenko, Nataliia, Bou-Harb, Elias, Furht, Borko
Published 2022
Springer International Publishing
Subjects: ...Computer networks—Security measures...

185
by Badhwar, Raj
Published 2021
Springer International Publishing
Table of Contents: ... for Linux - security risk and mitigation -- Common sense security measures for voice activated assistant...

186
Published 2023
Springer International Publishing
Table of Contents: ..., throughput, latency, and energy efficiency -- 4 Energy Saving as a Security Threat in LPWAN and Internet...

187
Published 2024
Springer Nature Singapore
Table of Contents: ...–Computer Interaction: Design Principles, Types, and User Experience -- Opinion Mining-Based Predictive...

188
Published 2022
Springer International Publishing
Table of Contents: ... the Information -- SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures...

189
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ....Security Measures for WSN -- 4.Secure Routing in WSN -- 5.Routing Classifications in WSN -- 6.WSN Security...

190
by Parker, Carey
Published 2023
Apress
Table of Contents: ... -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice...

191
Published 2014
Auerbach
Table of Contents: ...<P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection...

192
by Fleishman, Glenn
Published 2022
Take Control Books
Subjects: ...Mobile computing / Security measures...

193
Published 2022
Springer International Publishing
Table of Contents: ... Detection Using a Set of Rules -- Mobile Malware Detection using Consortium Blockchain -- BERT for Malware...

194
by Sarker, Iqbal H.
Published 2024
Springer Nature Switzerland
Table of Contents: .... Cybersecurity Background Knowledge: Terminologies, Attack Frameworks and Security Life Cycle -- Part II AI/XAI...

195
by Sheikh, Ahmed F.
Published 2024
Apress
Subjects: ...Computer networks / Security measures...

196
Published 2020
Springer Nature Singapore
Table of Contents: ...A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure...

197
by Dutta, Nitul, Sarma, Hiren Kumar Deva, Jadeja, Rajendrasinh, Delvadia, Krishna
Published 2021
Springer International Publishing
Table of Contents: ... networks in wireless sensor networks -- 9.6 Information centric networks in mobile adhoc networks -- 9.7...

198
Published 2021
Springer Fachmedien Wiesbaden
Subjects: ...Computer networks / Security measures...

199
Published 2021
Springer Nature Singapore
Table of Contents: ...Applied Cryptography for Big Data -- Big Data System Security -- Forensics in Social Networks...

200
Published 2023
Springer Nature Switzerland
Table of Contents: ...Quantum-resistant MACsec and IPsec for Virtual Private Networks -- Post-Quantum Security...