Search

Your search keyword '"Locasto, M E"' showing total 53 results

Search Constraints

Start Over You searched for: "Locasto, M E" Remove constraint "Locasto, M E" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
53 results on '"Locasto, M E"'

Search Results

1. Recommendations for Developing More Usable and Effective Hands-on Cybersecurity Education Materials Based on Critical Evaluation Criteria.

2. Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack.

3. Applications of educational data mining and learning analytics on data from cybersecurity training.

4. Stronger data poisoning attacks break data sanitization defenses.

7. Malware Detection in PDF and Office Documents: A survey.

9. WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense.

10. Interpersonal process recall: a novel approach to illuminating students' software development processes.

12. A Survey on the Moving Target Defense Strategies: An Architectural Perspective.

13. At the Crossroads of my Career Path and Social Network Clickstreams: Survey instrument design and development.

14. Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network.

15. Improved Generic Attacks Against Hash-Based MACs and HAIFA.

16. Anonymous and leakage resilient IBE and IPE.

17. Cyberterrorism and Cyber Attacks in the Public Sector: How Public Administration Copes with Digital Threats.

18. Elliptic Curve Multiset Hash.

24. Instruction set randomization based on compilation.

26. Locating Zero-day Exploits With Course-Grained Forensics.

30. Game-theoretic strategies for IDS deployment in peer-to-peer networks.

32. Efficient Secure-Channel Free Public Key Encryption with Keyword Search for EMRs in Cloud Storage.

34. Realizing Complex Integrated Systems

35. Leveraging Futuristic Machine Learning and Next-Generational Security for E-Governance

36. Cybersecurity Ethics : An Introduction

37. Dynamically Enabled Cyber Defense

38. Research Anthology on Advancements in Cybersecurity Education

39. Research Anthology on Business Aspects of Cybersecurity

40. Cyber Security Education : Principles and Policies

41. Cyber Warfare and Terrorism : Concepts, Methodologies, Tools, and Applications

42. التكنولوجيا التطبيقية وادارة الابداع

43. Global Cyber Security Labor Shortage and International Business Risk

44. Cyber Defence in Industry 4.0 Systems and Related Logistics and IT Infrastructures

45. Coping with Illness Digitally

46. Deep Learning Innovations and Their Convergence With Big Data

47. Security and Management

48. Electronics, Electrical Engineering And Information Science - Proceedings Of The 2015 International Conference (Eeeis2015)

49. DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance

50. Handbook of Research on Threat Detection and Countermeasures in Network Security

Catalog

Books, media, physical & digital resources