Yazar
Colbert, Edward J. M. editor.
Format:
Electronic Resources
Alıntı:
Cyber-security of SCADA and Other Industrial Control Systems Colbert, Edward J. M. editor.
Yazar
Davi, Lucas. author.
Format:
Electronic Resources
Alıntı:
watchdogs such as Microsoft EMET. Chapters also explain the principle of control-flow integrity (CFI
View Other Search Results
Yazar
Vaidya, Jaideep. editor.
Format:
Electronic Resources
Alıntı:
authentication, access control, availability, integrity, privacy, confidentiality, dependability and
Yazar
Nandi, Sukumar. editor.
Format:
Electronic Resources
Alıntı:
: authentication and access control, malware analysis, network security, privacy preservation, secure software
Yazar
Vaidya, Jaideep. editor.
Format:
Electronic Resources
Alıntı:
authentication, access control, availability, integrity, privacy, confidentiality, dependability and
Yazar
Al-Shaer, Ehab. author.
Format:
Electronic Resources
Alıntı:
. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list
Yazar
Schapranow, Matthieu-P. author.
Format:
Electronic Resources
Alıntı:
enables a continuous control of access based on the real-time analysis of the complete query history and a
Yazar
Damsgaard Jensen, Christian. editor.
Format:
Electronic Resources
Alıntı:
Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and
9.
Yazar
Hameurlain, Abdelkader. editor.
Format:
Electronic Resources
Alıntı:
decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and
Yazar
Mori, Paolo. editor. (orcid)0000-0002-6618-0388
Format:
Electronic Resources
Alıntı:
Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber
Yazar
Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040
Format:
Electronic Resources
Alıntı:
Management System -- CNTC: A Container Aware Network Traffic Control Framework -- BlockP2P: Enabling Fast
Yazar
Perdisci, Roberto. editor.
Format:
Electronic Resources
Alıntı:
Reconnaissance Campaigns Targeting Industrial Control Systems -- Overshadow PLC to Detect Remote Control
Arama Sonuçlarını Sınırlandır
Daraltılmış: