Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.
Telecommunication systems --- Computer networks --- Security measures --- Computer security. --- Computer organization. --- Computers. --- Application software. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let’s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop.
Telecommunication systems --- Computer networks --- Security measures --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer security. --- Computer organization. --- Computers. --- Application software. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Organization, Computer --- Electronic digital computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Choose an application
Listing 1 - 4 of 4 |
Sort by
|