Wang, Cliff.
Overview
| Works: | 2 works in 9 publications in 1 languages | |
|---|---|---|
Titles
Cyber defense and situational awareness
by:
Erbacher, Robert F.; Kott, Alexander.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
Botnet Detection :Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
Proactive and dynamic network defense
by:
Lu, Zhuo.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Lu, Zhou.; SpringerLink (Online service); Wang, Cliff.; Wang, Wenye.
(Electronic resources)
Introduction to hardware security and trust
by:
SpringerLink (Online service); Tehranipoor, Mohammad.; Wang, Cliff.
(Electronic resources)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Liu, Peng.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
Fundamentals of sketch-based passwordsa general framework /
by:
Riggan, Benjamin S.; Snyder, Wesley E.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
AI embedded assurance for cyber systems
by:
Iyengar, S. S.; SpringerLink (Online service); Sun, Kun.; Wang, Cliff.
(Electronic resources)
Cyber deceptiontechniques, strategies, and human aspects /
by:
Bao, Tiffany.; SpringerLink (Online service); Tambe, Milind.; Wang, Cliff.
(Electronic resources)
Subjects
Data Structures, Cryptology and Information Theory.
Computer security.
Pattern recognition systems.
Communications Engineering, Networks.
Cyberspace
Mobile and Network Security.
Computer input-output equipment
Data and Information Security.
Computer Crime.
Electronics and Microelectronics, Instrumentation.
Information Systems Applications (incl. Internet)
Wireless Internet
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity.
Data protection.
Processor Architectures.
Biometrics.
Data encryption (Computer science)
User Interfaces and Human Computer Interaction.
Principles and Models of Security.
Circuits and Systems.
Internet
Computational Intelligence.
Cyber-Physical Systems.
Data Encryption.
Information Systems Applications (incl.Internet)
Human-computer interaction.
Telecommunication.
Security.
Machine Learning.
Artificial Intelligence.
Computer networks
Computer Science.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.
Systems and Data Security.
Engineering.
Computers
Cryptography.
Machine learning.
Cybercrime.
Computer crimes
Artificial intelligence.
Cooperating objects (Computer systems)
Digital forensic science.