Listing 1 - 10 of 41 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
Computer security. --- Computers. --- Computer communication systems. --- Data encryption (Computer science). --- Artificial intelligence. --- Systems and Data Security. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Computing Milieux. --- Cryptology. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 4th International Symposium on Mobile Internet Security, MobiSec 2019, held in Taichung, Taiwan, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in the topical sections: mobile internet security; mobile application and security; vehicular network security; deep learning applications.
Computer science. --- Data protection. --- Computers. --- Computer communication systems. --- Data structures (Computer science). --- Artificial intelligence. --- Computer Science, general. --- Security. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Data Structures and Information Theory. --- Artificial Intelligence. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Distributed processing --- Internet --- Security measures --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web
Choose an application
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.
Computer security. --- Artificial intelligence. --- Computers. --- Data encryption (Computer science). --- Computer networks --- Systems and Data Security. --- Artificial Intelligence. --- Computing Milieux. --- Cryptology. --- Mobile and Network Security. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Mobile communication systems --- Internet --- Security measures --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems --- Sistemes de comunicacions mòbils --- Sistemes de seguretat
Choose an application
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023. The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
Choose an application
Choose an application
Choose an application
This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
Choose an application
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.
Listing 1 - 10 of 41 | << page >> |
Sort by
|