Search

Your search keyword '"005.8"' showing total 1,027 results

Search Constraints

Start Over You searched for: Descriptor "005.8" Remove constraint Descriptor: "005.8"
1,027 results on '"005.8"'

Search Results

2. Novel approaches to applied cybersecurity in privacy, encryption, security systems, web credentials, and education

3. Privacy and utility in secure computations : optimal trade-offs through quantitative information flow

5. Intrusion Detection Systems using Machine Learning and Deep Learning techniques

6. Integration of cybersecurity in BIM-enabled facilities management organisations

7. An investigation to cybersecurity countermeasures for global Internet infrastructure

8. National cybersecurity capacity building framework for countries in a transitional phase

9. On the impact of privacy policy and app permissions linkage on users' disclosure decisions

10. A framework for understanding and establishing an effective information security culture

11. Economic drivers in security decisions in public Wi-Fi context

12. Software as a weapon : concepts, perceptions, and motivations in pursuit of a new technology of conflict

13. Network-based advanced malware detection using multi-classifier machine learning

15. Security risk assessment in systems of systems

16. Analysis of implementations and side-channel security of Frodo on embedded devices

17. Network traffic behaviour profiling

18. Non-state actors and norms of responsible behaviour in cyberspace

19. Improving automated protocol verification : real world cryptography

21. Kleptography and steganography in blockchains

23. Inline and sideline approaches for low-cost memory safety in C

24. On the foundations of proof-of-work based blockchain protocols

25. Continuous authentication on mobile devices

26. Graph spectral domain data hiding

27. Towards analysing cyber physical systems in 3D virtual environments

28. Fully Homomorphic Encryption applications : the strive towards practicality

29. Risk analysis and management of security threats in virtualised information systems using predictive analytics

30. A mixed methods approach to understanding cyber-security vulnerability in the baby boomer population

31. Tackling the challenges of information security incident reporting : a decentralized approach

32. A policy-based management approach to security in cloud systems

33. Towards real-time anomaly detection within X-ray security imagery : self-supervised adversarial training approach

34. Negotiation transparency and consistency in configurable protocols : an empirical investigation

35. User profiling based on network application traffic monitoring

36. Building cyber defense training capacity

37. Optimizing deterrence strategies in state-state cyber conflicts : theoretical models for strategic cyber deterrence

38. Conceptualising adaptive cyber risk management : complexity, rationality and knowledge

39. Formalising cryptography using CryptHOL

40. ICSrank : a security assessment framework for Industrial Control Systems (ICS)

41. Understanding the challenges of using personal data in media experiences

42. A novel framework for improving cyber security management and awareness for home users

43. User-controlled cyber-security using automated key generation

44. Privacy : preserving third party data mining using cryptography

45. Physical layer key generation in resource constrained wireless communication networks

46. A novel component based framework for covert data leakage detection

47. CryptDB mechanism on graph databases

48. Malware detection in security operation centres

49. Appropriate security and confinement technologies : methods for the design of appropriate security and a case study on confinement technologies for desktop computers

50. Cyber supply chain risks in cloud computing : the effect of transparency on the risk assessment of SaaS applications

Catalog

Books, media, physical & digital resources