Jump to main content
図書

Advances in information security

Icons representing 図書

Advances in information security

Material type
図書
Author
-
Publisher
Kluwer Academic Publishers
Publication date
c2001-
Material Format
Paper
Capacity, size, etc.
-
NDC
-
View All

Notes on use

Note (General):

Publisher varies: Springer

Related materials as well as pre- and post-revision versions

Data warehousing and data mining techniques for cyber securityLeave the NDL website. Encryption for digital contentLeave the NDL website. Intrusion detection and correlation : challenges and solutionsLeave the NDL website. Security in e-learningLeave the NDL website. Cyber-security of SCADA and other industrial control systemsLeave the NDL website. Preserving privacy in data outsourcingLeave the NDL website. Image and video encryption : from digital rights management to secured personal communicationLeave the NDL website. Synchronizing internet protocol security (sipsec)Leave the NDL website. Secure electronic votingLeave the NDL website. Multivariate public key cryptosystemsLeave the NDL website. Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)Leave the NDL website. Security for wireless sensor networksLeave the NDL website. Privacy preserving data miningLeave the NDL website. Applications of data mining in computer securityLeave the NDL website. Network intrusion detection and prevention : concepts and techniquesLeave the NDL website. Secure multi-party non-repudiation protocols and applicationsLeave the NDL website. Trusted recovery and defensive information warfareLeave the NDL website. Information hiding : steganography and watermarking - attacks and countermeasuresLeave the NDL website. Cryptographics : exploiting graphics cards for securityLeave the NDL website. Intrusion detection in distributed systems : an abstraction-based approachLeave the NDL website. Network security policies and proceduresLeave the NDL website. Secure data management in decentralized systemsLeave the NDL website. Intrusion detection systemsLeave the NDL website. Mobile computation with functionsLeave the NDL website. Binary code fingerprinting for cybersecurity : application to malicious code fingerprintingLeave the NDL website. Proactive and dynamic network defenseLeave the NDL website. Fog/edge computing for security, privacy, and applicationsLeave the NDL website. Cloud security auditingLeave the NDL website. Secure localization and time synchronization for wireless sensor and ad hoc networksLeave the NDL website. Disseminating security updates at Internet scaleLeave the NDL website. Security for telecommunications networksLeave the NDL website. Insider attack and cyber security : beyond the hackerLeave the NDL website. Economics of information securityLeave the NDL website. Recent advances in RSA cryptographyLeave the NDL website. E-commerce security and privacyLeave the NDL website. Differential privacy and applicationsLeave the NDL website. Cyber denial, deception and counter deception : a framework for supporting active cyber defenseLeave the NDL website. Botnet detection : countering the largest security threatLeave the NDL website. Primality testing and integer factorization in public-key cryptographyLeave the NDL website. Understanding intrusion detection through visualizationLeave the NDL website. Secure key establishmentLeave the NDL website. Adaptive cryptographic access controlLeave the NDL website. Synchronizing E-securityLeave the NDL website. Primality testing and integer factorization in public-key cryptographyLeave the NDL website. Malicious attack propagation and source identificationLeave the NDL website. Blockchain cybersecurity, trust and privacyLeave the NDL website. Multivariate public key cryptosystemsLeave the NDL website. Cyber threat intelligenceLeave the NDL website. Industrial control systems security and resiliency : practice and theoryLeave the NDL website. Versatile cybersecurityLeave the NDL website. Cross-layer design for secure and resilient Cyber-Physical Systems : a decision and game theoretic approachLeave the NDL website. New dimensions of information warfareLeave the NDL website. Smart micro-grid systems security and privacyLeave the NDL website.

Search by Bookstore

Holdings of Libraries in Japan

This page shows libraries in Japan other than the National Diet Library that hold the material.

Please contact your local library for information on how to use materials or whether it is possible to request materials from the holding libraries.

other

  • CiNii Research

    Search Service
    Paper
    You can check the holdings of institutions and databases with which CiNii Research is linked at the site of CiNii Research.

Bibliographic Record

You can check the details of this material, its authority (keywords that refer to materials on the same subject, author's name, etc.), etc.

Paper

Material Type
図書
Publication, Distribution, etc.
Publication Date
c2001-
Publication Date (W3CDTF)
2001
Alternative Title
ADIS
Place of Publication (Country Code)
us
Target Audience
一般
Note (General)
Publisher varies: Springer
Related Material
Data warehousing and data mining techniques for cyber security
Encryption for digital content
Intrusion detection and correlation : challenges and solutions
Security in e-learning
Cyber-security of SCADA and other industrial control systems
Preserving privacy in data outsourcing
Image and video encryption : from digital rights management to secured personal communication
Synchronizing internet protocol security (sipsec)
Secure electronic voting
Multivariate public key cryptosystems
Impacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)
Security for wireless sensor networks
Privacy preserving data mining
Applications of data mining in computer security
Network intrusion detection and prevention : concepts and techniques
Secure multi-party non-repudiation protocols and applications
Trusted recovery and defensive information warfare
Information hiding : steganography and watermarking - attacks and countermeasures
Cryptographics : exploiting graphics cards for security
Intrusion detection in distributed systems : an abstraction-based approach
Network security policies and procedures
Secure data management in decentralized systems
Intrusion detection systems
Mobile computation with functions
Binary code fingerprinting for cybersecurity : application to malicious code fingerprinting
Proactive and dynamic network defense
Fog/edge computing for security, privacy, and applications
Cloud security auditing
Secure localization and time synchronization for wireless sensor and ad hoc networks
Disseminating security updates at Internet scale
Security for telecommunications networks
Insider attack and cyber security : beyond the hacker
Economics of information security
Recent advances in RSA cryptography
E-commerce security and privacy
Differential privacy and applications
Cyber denial, deception and counter deception : a framework for supporting active cyber defense
Botnet detection : countering the largest security threat
Primality testing and integer factorization in public-key cryptography
Understanding intrusion detection through visualization
Secure key establishment
Adaptive cryptographic access control
Synchronizing E-security
Primality testing and integer factorization in public-key cryptography
Malicious attack propagation and source identification
Blockchain cybersecurity, trust and privacy
Multivariate public key cryptosystems
Cyber threat intelligence
Industrial control systems security and resiliency : practice and theory
Versatile cybersecurity
Cross-layer design for secure and resilient Cyber-Physical Systems : a decision and game theoretic approach
New dimensions of information warfare
Smart micro-grid systems security and privacy