Search by Bookstore
Holdings of Libraries in Japan
This page shows libraries in Japan other than the National Diet Library that hold the material.
Please contact your local library for information on how to use materials or whether it is possible to request materials from the holding libraries.
other
CiNii Research
Search ServicePaperYou can check the holdings of institutions and databases with which CiNii Research is linked at the site of CiNii Research.
Search by Bookstore
Bibliographic Record
You can check the details of this material, its authority (keywords that refer to materials on the same subject, author's name, etc.), etc.
- Material Type
- 図書
- Publication, Distribution, etc.
- Publication Date
- c2001-
- Publication Date (W3CDTF)
- 2001
- Alternative Title
- ADIS
- Place of Publication (Country Code)
- us
- Target Audience
- 一般
- Note (General)
- Publisher varies: Springer
- Related Material
- Data warehousing and data mining techniques for cyber securityEncryption for digital contentIntrusion detection and correlation : challenges and solutionsSecurity in e-learningCyber-security of SCADA and other industrial control systemsPreserving privacy in data outsourcingImage and video encryption : from digital rights management to secured personal communicationSynchronizing internet protocol security (sipsec)Secure electronic votingMultivariate public key cryptosystemsImpacts and risk assessment of technology for Internet security : enabled information small-medium enterprises (TEISMES)Security for wireless sensor networksPrivacy preserving data miningApplications of data mining in computer securityNetwork intrusion detection and prevention : concepts and techniquesSecure multi-party non-repudiation protocols and applicationsTrusted recovery and defensive information warfareInformation hiding : steganography and watermarking - attacks and countermeasuresCryptographics : exploiting graphics cards for securityIntrusion detection in distributed systems : an abstraction-based approachNetwork security policies and proceduresSecure data management in decentralized systemsIntrusion detection systemsMobile computation with functionsBinary code fingerprinting for cybersecurity : application to malicious code fingerprintingProactive and dynamic network defenseFog/edge computing for security, privacy, and applicationsCloud security auditingSecure localization and time synchronization for wireless sensor and ad hoc networksDisseminating security updates at Internet scaleSecurity for telecommunications networksInsider attack and cyber security : beyond the hackerEconomics of information securityRecent advances in RSA cryptographyE-commerce security and privacyDifferential privacy and applicationsCyber denial, deception and counter deception : a framework for supporting active cyber defenseBotnet detection : countering the largest security threatPrimality testing and integer factorization in public-key cryptographyUnderstanding intrusion detection through visualizationSecure key establishmentAdaptive cryptographic access controlSynchronizing E-securityPrimality testing and integer factorization in public-key cryptographyMalicious attack propagation and source identificationBlockchain cybersecurity, trust and privacyMultivariate public key cryptosystemsCyber threat intelligenceIndustrial control systems security and resiliency : practice and theoryVersatile cybersecurityCross-layer design for secure and resilient Cyber-Physical Systems : a decision and game theoretic approachNew dimensions of information warfareSmart micro-grid systems security and privacy