Neidio i'r cynnwys
Library Home
Start Over
Research Databases
E-Journals
Cronfeydd y Cwrs
Library Home
Mewngofnodi
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Iaith
Library Catalog
Pob Maes
Teitl
Awdur
Pwnc
Rhif Galw
ISBN/ISSN
Canfod
Chwiliad Uwch
|
Pori
|
Awgrymiadau Chwilio
Moving Target Defense
Dyfynnu hwn
Anfonwch hwn fel neges destun
E-bostio hwn
Argraffu
Allforio Cofnod
Allforio i RefWorks
Allforio i EndNoteWeb
Allforio i EndNote
Ychwanegu at ffefrynnau
Permanent link
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats / edited by Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang.
Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Awdur Corfforaethol:
SpringerLink (Online service)
Awduron Eraill:
Jajodia, Sushil
(Golygydd)
,
Ghosh, Anup K.
(Golygydd)
,
Swarup, Vipin
(Golygydd)
,
Wang, Cliff
(Golygydd)
,
Wang, X. Sean
(Golygydd)
Fformat:
eLyfr
Iaith:
English
Cyhoeddwyd:
New York, NY :
Springer New York : Imprint: Springer,
2011.
Rhifyn:
1st ed. 2011.
Cyfres:
Advances in Information Security,
54
Springer eBook Collection.
Pynciau:
Computer security.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computers.
Electronic resources (E-books)
Mynediad Ar-lein:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Daliadau
Disgrifiad
Tabl Cynhwysion
Eitemau Tebyg
Dangos Staff
Eitemau Tebyg
Cyber Defense and Situational Awareness
Cyhoeddwyd: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Cyhoeddwyd: (2013)
Insider Threats in Cyber Security
Cyhoeddwyd: (2010)
Vulnerability Analysis and Defense for the Internet
Cyhoeddwyd: (2008)
Cyber Warfare Building the Scientific Foundation
Cyhoeddwyd: (2015)
Cyber Security Deterrence and IT Protection for Critical Infrastructures
Cyhoeddwyd: (2013)
Cyber Deception Building the Scientific Foundation
Cyhoeddwyd: (2016)
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Cyhoeddwyd: (2018)
Insider Attack and Cyber Security Beyond the Hacker
Cyhoeddwyd: (2008)
Botnet Detection Countering the Largest Security Threat
Cyhoeddwyd: (2008)
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
Cyhoeddwyd: (2018)
Theory and Models for Cyber Situation Awareness
Cyhoeddwyd: (2017)
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
Cyhoeddwyd: (2019)
Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches
gan: Al-Shaer, Ehab, et al.
Cyhoeddwyd: (2016)
Introduction to Cyberdeception
gan: Rowe, Neil C., et al.
Cyhoeddwyd: (2016)
Security and the Networked Society
gan: Gregory, Mark A., et al.
Cyhoeddwyd: (2013)
Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings
Cyhoeddwyd: (2007)
Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense
gan: Heckman, Kristin E., et al.
Cyhoeddwyd: (2015)
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
Cyhoeddwyd: (2018)
Network Intrusion Detection and Prevention Concepts and Techniques
gan: Ghorbani, Ali A., et al.
Cyhoeddwyd: (2010)
ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Cyhoeddwyd: (2016)
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Cyhoeddwyd: (2013)
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers
Cyhoeddwyd: (2013)
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
Cyhoeddwyd: (2013)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
Cyhoeddwyd: (2019)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
Cyhoeddwyd: (2019)
Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Cyhoeddwyd: (2017)
Cyber Situational Awareness Issues and Research
Cyhoeddwyd: (2010)
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Cyhoeddwyd: (2019)
Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers
Cyhoeddwyd: (2019)
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
Cyhoeddwyd: (2019)
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Cyhoeddwyd: (2017)
Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
Cyhoeddwyd: (2017)
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
Cyhoeddwyd: (2018)
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Cyhoeddwyd: (2019)
Spyware and Adware
gan: Aycock, John
Cyhoeddwyd: (2011)
Secure Multi-Party Non-Repudiation Protocols and Applications
gan: Onieva, José A., et al.
Cyhoeddwyd: (2009)
Privacy-Respecting Intrusion Detection
gan: Flegel, Ulrich
Cyhoeddwyd: (2007)
Global Initiatives to Secure Cyberspace An Emerging Landscape
Cyhoeddwyd: (2009)
Intrusion Detection Systems
Cyhoeddwyd: (2008)
Blaenorol
Nesaf
Eitemau Tebyg
Cyber Defense and Situational Awareness
Cyhoeddwyd: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Cyhoeddwyd: (2013)
Insider Threats in Cyber Security
Cyhoeddwyd: (2010)
Vulnerability Analysis and Defense for the Internet
Cyhoeddwyd: (2008)
Cyber Warfare Building the Scientific Foundation
Cyhoeddwyd: (2015)