17 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Wang, Cliff,
Showing
1
-
17
of
17
for search:
'Wang, Cliff,'
, query time: 0.11s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Secure localization and time synchronization for wireless sensor and ad hoc networks
by
Poovendran, Radha.
Published: Springer, 2006
Description: 1 online resource (xiv, 392 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Modeling and evaluating denial of service attacks for wireless and mobile applications
by
Lu, Zhuo,
Published: Springer, 2015
Description: 1 online resource (xiii, 116 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Introduction to hardware security and trust
Published: Springer, 2012
Description: 1 online resource (viii, 427 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Theory and models for cyber situation awareness
Published: Springer, 2017
Description: 1 online resource (vii, 227 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Fundamentals of sketch-based passwords : a general framework
by
Riggan, Benjamin S.
Published: Springer, 2014
Description: 1 online resource (xii, 71 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Proactive and dynamic network defense
Published: Springer, 2019
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings
by
Al-Shaer, Ehab S., 1967-
Published: Springer, 2019
Description: 1 online resource (xvi, 235 pages) : illustrations (some color)
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
AI embedded assurance for cyber systems
Published: Springer, 2023
Description: 1 online resource (xvii, 246 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
Botnet detection : countering the largest security threat
Published: Springer, 2007
Description: 1 online resource (xii, 167 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
10
Cyber deception : building the scientific foundation
Published: Springer, 2016
Description: 1 online resource (x, 314 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
11
Cyber defense and situational awareness
Published: Springer, 2014
Description: 1 online resource (xvii, 329 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
12
Cyber warfare : building the scientific foundation
Published: Springer, 2015
Description: 1 online resource (xiii, 321 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
13
Digital fingerprinting
Published: Springer, 2016
Description: 1 online resource (189 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
14
Adaptive autonomous secure cyber systems
Published: Springer, 2020
Description: 1 online resource (x, 289 pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
15
Cyber deception techniques, strategies, and human aspects
Published: Springer, 2022
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
Electronic
Loading...
Save to List
Saved in:
16
Adversarial and uncertain reasoning for adaptive cyber defense : control- and game-theoretic approaches to cyber security
Published: Springer, 2019
Description: 1 online resource : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
17
Secure cloud computing
Published: Springer Science and Business Media, 2014
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security
Computer networks Security measures
Internet Security measures
Machine learning
Artificial intelligence
Cloud computing
Cloud computing Security measures
Computer crimes
Computer crimes Prevention
Computer fraud
Computer input-output equipment Security measures
Computers Access control Passwords
Control theory
Cooperating objects (Computer systems) Security measures
Cryptography
Cyber intelligence (Computer security)
Cyberspace Security measures
Cyberspace operations (Military science)
Data encryption (Computer science)
Data protection
Digital forensic science
Human-computer interaction
Pattern recognition systems
Sensor networks
Telecommunication
Wireless Internet Security measures
Wireless communication systems Security measures
×
Loading...