ACSAC'97
Author : Computer Security Applications Conference
Publisher :
Page : 0 pages
File Size : 24,43 MB
Release : 1997
Category : Computer security
ISBN : 9780818682759
Author : Computer Security Applications Conference
Publisher :
Page : 0 pages
File Size : 24,43 MB
Release : 1997
Category : Computer security
ISBN : 9780818682759
Author :
Publisher :
Page : 370 pages
File Size : 44,62 MB
Release : 1997
Category : Computer security
ISBN :
Author :
Publisher :
Page : 400 pages
File Size : 24,81 MB
Release : 1990
Category : Computer security
ISBN :
Author :
Publisher :
Page : 878 pages
File Size : 38,17 MB
Release : 1990
Category : Computer security
ISBN :
Author : Franz Abt
Publisher :
Page : 0 pages
File Size : 47,24 MB
Release : 1992
Category :
ISBN : 9780769220413
Author : Charles N. Payne
Publisher :
Page : 374 pages
File Size : 43,44 MB
Release : 2013
Category : Computer science
ISBN : 9781450320153
Author :
Publisher :
Page : 433 pages
File Size : 43,98 MB
Release : 2002
Category :
ISBN :
Author : Álvaro Herrero
Publisher : Springer Nature
Page : 477 pages
File Size : 46,37 MB
Release : 2020-08-27
Category : Technology & Engineering
ISBN : 3030578054
This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.
Author : Applied Computer Security Associates
Publisher : Institute of Electrical & Electronics Engineers(IEEE)
Page : 428 pages
File Size : 49,45 MB
Release : 1999
Category : Computer security
ISBN :
Proceedings of a December 1999 conference, with papers in sections on electronic commerce, system engineering, networks, security analysis, workflow, crypto, composition problems of component TOEs, security policy, and public infrastructures. Other subjects include information security education, mobile code, legal and technical responses to protecting US critical infrastructures, security architectures, middleware, and intrusion detection. Some specific topics are security policy coordination for heterogeneous information systems, user authentication in the Java platform, and relevancy analysis on the registry of Windows NT 4.0. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
Author :
Publisher :
Page : pages
File Size : 42,98 MB
Release : 2019
Category : Computer security
ISBN :