Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies.
Bemærk: Kan ikke leveres før jul.
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking... Læs mere
Bemærk: Kan ikke leveres før jul.
Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 11th IFIP TC 12... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the 14th IFIP WG 11.12... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 35th IFIP TC 11... Læs mere