This book, structured as an edited volume, consists of 12 chapters organized into four key themes...
This book provides the foundations for understanding hardware security and trust, which have beco...
This volume is published in honor of Professor Chaochen Zhou's 80th birthday. The Festschrift con...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
This is the first book on digital fingerprinting that comprehensively covers the major areas of s...
This book presents a range of cloud computing security challenges and promising solution paths. T...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This book is the first publication to give a comprehensive, structured treatment to the important...
This book is the first publication to give a comprehensive, structured treatment to the important...
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Unser bisheriger Preis:ORGPRICE: 149,99 €
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
This textbook surveys the knowledge base in automated and resilient cyber deception. It features...
Botnets have become the platform of choice for launching attacks and committing fraud on the Inte...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
Today, when a security incident happens, the top three questions a cyber operation center would a...
This edited volume features a wide spectrum of the latest computer science research relating to c...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book provides the foundations for understanding hardware security and trust, which have beco...
This SpringerBrief explores graphical password systems and examines novel drawing-based methods i...
This book discusses and summarizes current research issues, identifies challenges, and outlines ...
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless...
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wirele...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This edited volume features a wide spectrum of the latest computer science research relating to c...
This is the first book on digital fingerprinting that comprehensively covers the major areas of s...
Botnets have become the platform of choice for launching attacks and committing fraud on the Inte...
Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In resp...
This book introduces recent research results for cyber deception, a promising field for proactive...
The rapid growth and reliance on cyber systems have permeated our society, government, and milita...
This book introduces recent research results for cyber deception, a promising field for proactive...
The rapid growth and reliance on cyber systems have permeated our society, government, and milita...
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wirele...
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure...
Unser bisheriger Preis:ORGPRICE: 379,50 €