語系
Wang, Cliff.
概要
| 作品: | 10 作品在 9 項出版品 1 種語言 | |
|---|---|---|
書目資訊
Cyber defense and situational awareness
by:
Kott, Alexander.; Wang, Cliff.; Erbacher, Robert F.; SpringerLink (Online service)
(書目-電子資源)
Proactive and dynamic network defense
by:
Wang, Cliff.; SpringerLink (Online service); Lu, Zhuo.
(書目-電子資源)
Introduction to hardware security and trust
by:
Tehranipoor, Mohammad.; Wang, Cliff.; SpringerLink (Online service)
(書目-電子資源)
Botnet Detection = Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; Wang, Cliff.; SpringerLink (Online service)
(書目-語言資料,印刷品)
AI embedded assurance for cyber systems
by:
Wang, Cliff.; SpringerLink (Online service); Iyengar, S. S.; Sun, Kun.
(書目-電子資源)
Fundamentals of sketch-based passwords = a general framework /
by:
Riggan, Benjamin S.; Snyder, Wesley E.; Wang, Cliff.; SpringerLink (Online service)
(書目-電子資源)
Theory and models for cyber situation awareness
by:
Liu, Peng.; Wang, Cliff.; SpringerLink (Online service); Jajodia, Sushil.
(書目-電子資源)
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Wang, Cliff.; SpringerLink (Online service); Lu, Zhou.; Wang, Wenye.
(書目-電子資源)
Cyber deception = techniques, strategies, and human aspects /
by:
Wang, Cliff.; SpringerLink (Online service); Bao, Tiffany.; Tambe, Milind.
(書目-電子資源)
主題
Data Structures, Cryptology and Information Theory.
Computer security.
Pattern recognition systems.
Communications Engineering, Networks.
Mobile and Network Security.
Computer networks- Security measures.
Data and Information Security.
Computer Crime.
Electronics and Microelectronics, Instrumentation.
Information Systems Applications (incl. Internet)
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity.
Data protection.
Processor Architectures.
Biometrics.
Wireless Internet- Security measures.
Data encryption (Computer science)
User Interfaces and Human Computer Interaction.
Principles and Models of Security.
Computer networks- Security measures
Circuits and Systems.
Computer crimes- Prevention.
Computational Intelligence.
Cyber-Physical Systems.
Data Encryption.
Information Systems Applications (incl.Internet)
Computer input-output equipment- Security measures.
Computers- Access control
Human-computer interaction.
Telecommunication.
Security.
Machine Learning.
Artificial Intelligence.
Computer Science.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.
Systems and Data Security.
Engineering.
Cryptography.
Cyberspace- Security measures.
Machine learning.
Cooperating objects (Computer systems)- Security measures.
Cybercrime.
Internet- Security measures.
Artificial intelligence.
Digital forensic science.