-
1
-
2
-
3Published 2013Table of Contents: “…Cyber as Deterrent -- Cyber Security and Cyber Weapons: is Nonproliferation possible? -- Cyber…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2015Table of Contents: “… -- Research and innovation in cyber security and privacy.…”
Full Text via HEAL-Link
Electronic eBook -
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13Published 2010Table of Contents: “… Management -- A State of the Art Survey of Fraud Detection Technology -- Combining Traditional Cyber Security…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2018Table of Contents: “… for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2019Table of Contents: “…Network Data Collection, Fusion, Mining and Analytics for Cyber Security -- Malicious Web Request…”
Full Text via HEAL-Link
Electronic eBook -
16
-
17Published 2018Table of Contents: “… strategies in the cyber warfare -- 3 Cyber Security Strategy Implementation Architecture in a Value System…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2012Table of Contents: “…Frontmatter -- Introduction -- Cyber Security Evolution -- Cyber Security Objectives -- Guidance…”
Full Text via HEAL-Link
eBook -
19
-
20Published 2021“… Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented…”
Get full text