Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.
Computer security --- Computer networking & communications --- Coding theory & cryptology --- Network security --- Artificial intelligence --- Software Engineering --- artificial intelligence --- authentication --- computer hardware --- computer networks --- computer security --- computer systems --- cryptography --- data communication systems --- data mining --- data security --- databases --- information retrieval --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
Computer security --- Computer networking & communications --- Artificial intelligence --- Legal aspects of IT --- Network security --- application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.
application service layer --- artificial intelligence --- communication systems --- computer crime --- computer networks --- computer security --- computer systems --- cryptography --- cyber security --- data communication systems --- data security --- databases --- machine learning --- network protocols --- network security --- privacy --- signal processing --- telecommunication networks --- telecommunication systems
Choose an application
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.
Computer security. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer science --- Computer security
Choose an application
Choose an application
Choose an application
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- netwerk management
Choose an application
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
Computer security. --- Computer communication systems. --- Application software. --- Architecture, Computer. --- Data encryption (Computer science). --- Computer networks --- Systems and Data Security. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer System Implementation. --- Cryptology. --- Mobile and Network Security. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Architecture, Computer --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Distributed processing --- Protection --- Security measures --- Systems and Data Security --- Computer Communication Networks --- Information Systems Applications (incl. Internet) --- Computer System Implementation --- Cryptology --- Mobile and Network Security --- Data and Information Security --- Computer and Information Systems Applications --- communication channels (information theory) --- communication systems --- computer crime --- computer hardware --- computer networks --- computer security --- computer systems --- cryptography --- data communication systems --- data security --- databases --- network protocols --- network security --- sensors --- signal processing --- telecommunication networks --- telecommunication systems --- telecommunication traffic --- wireless telecommunication systems --- Network hardware --- Information retrieval --- Internet searching --- Systems analysis & design --- Coding theory & cryptology --- Data encryption
Listing 1 - 10 of 11 | << page >> |
Sort by
|