Sökt på: Sökresultat
totalt 10 träffar
Network Classification for Traffic Management
With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling …
SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control …
Homomorphic Encryption and Applications
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private …
SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems?the control …
Network Classification for Traffic Management
With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling …
Quality, Reliability, Security and Robustness in Heterogeneous Systems
This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, …
Private Information Retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the …
SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control …
Quality, Reliability, Security and Robustness in Heterogeneous Systems
This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, …
Homomorphic Encryption and Applications
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private …