-
1Published 2018Table of Contents: “… Proactive Defense Scheme Based on IP and MAC Address Mutation -- An Attribute Based Encryption Middleware…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2012Table of Contents: “…Invited Talk: Human-Agent Teamwork in Cyber Defense -- Invited Talk: 25 Years of Distributed AI…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2019Table of Contents: “… Simulated Environment -- Experiment of the Tactical Decision Support System Within Company Defensive…”
Full Text via HEAL-Link
Electronic eBook -
4
-
5Published 2012Table of Contents: “… - The DORII Platform Test Case.- Part II: Software Platforms -- 7. Sortism: A High-Level Simulator…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2007Table of Contents: “… Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2016Table of Contents: “… Stability Indices -- CFD Simulation of Contaminant Transportation in High-Risk Buildings using CONTAM…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2007Table of Contents: “… Cooperative Defense Against Internet Attacks -- On Competing Agents Consistent with Expert Knowledge…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2008Table of Contents: “… Matchmaking and Argumentation -- Agent Applications in Defense Logistics -- AGENTFLY: Towards Multi-Agent…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2011Subjects: “…Information Systems Applications (incl. Internet).…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2015Table of Contents: “… Tutoring Context -- Intelligent Information Systems in Security and Defense -- FP-tree and SVM…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2007Table of Contents: “… and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2013Table of Contents: “… -- Simulation-Based Fault Propagation Analysis – Application on Hydrogen Production Plant -- Automatic…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2007Table of Contents: “… Switching for Wireless Sensor Network -- WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2018Table of Contents: “… and what you can't: human experience in computer network defenses -- Attack simulation for a realistic…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2019Table of Contents: “… Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2003Table of Contents: “… for Viewing Internet Products on Mobile Phones -- Evolution -- A Conceptualization of OO Evolution -- Workflow…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2013Table of Contents: “…Political and Economic Implications of Authoritarian Control of the Internet -- Data Handling…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2019Table of Contents: “… of Cyber Attacks -- Chapter 8. Modeling and Simulation Approaches -- Part 3. Enhancing Cyber Resilience…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2016Table of Contents: “… in Supply Chain Management for Internet Marketing.-Intelligent Mechanism for Cloud Federation…”
Full Text via HEAL-Link
Electronic eBook