Languages
Wang, Cliff.
Overview
| Works: | 10 works in 9 publications in 1 languages | |
|---|---|---|
Titles
Cyber defense and situational awareness
by:
Kott, Alexander.; Wang, Cliff.; Erbacher, Robert F.; SpringerLink (Online service)
(Electronic resources)
Proactive and dynamic network defense
by:
Wang, Cliff.; SpringerLink (Online service); Lu, Zhuo.
(Electronic resources)
Introduction to hardware security and trust
by:
Tehranipoor, Mohammad.; Wang, Cliff.; SpringerLink (Online service)
(Electronic resources)
Botnet Detection = Countering the Largest Security Threat /
by:
Dagon, David.; Lee, Wenke.; Wang, Cliff.; SpringerLink (Online service)
(Language materials, printed)
AI embedded assurance for cyber systems
by:
Wang, Cliff.; SpringerLink (Online service); Iyengar, S. S.; Sun, Kun.
(Electronic resources)
Theory and models for cyber situation awareness
by:
Wang, Cliff.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.
(Electronic resources)
Fundamentals of sketch-based passwords = a general framework /
by:
Riggan, Benjamin S.; Snyder, Wesley E.; Wang, Cliff.; SpringerLink (Online service)
(Electronic resources)
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
Wang, Wenye.; Wang, Cliff.; SpringerLink (Online service); Lu, Zhou.
(Electronic resources)
Cyber deception = techniques, strategies, and human aspects /
by:
Wang, Cliff.; SpringerLink (Online service); Bao, Tiffany.; Tambe, Milind.
(Electronic resources)
Subjects
Data Structures, Cryptology and Information Theory.
Computer security.
Pattern recognition systems.
Communications Engineering, Networks.
Mobile and Network Security.
Computer networks- Security measures.
Data and Information Security.
Computer Crime.
Electronics and Microelectronics, Instrumentation.
Information Systems Applications (incl. Internet)
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity.
Data protection.
Processor Architectures.
Biometrics.
Wireless Internet- Security measures.
Data encryption (Computer science)
User Interfaces and Human Computer Interaction.
Principles and Models of Security.
Computer networks- Security measures
Circuits and Systems.
Computer crimes- Prevention.
Computational Intelligence.
Cyber-Physical Systems.
Data Encryption.
Information Systems Applications (incl.Internet)
Computer input-output equipment- Security measures.
Computers- Access control
Human-computer interaction.
Telecommunication.
Security.
Machine Learning.
Artificial Intelligence.
Computer Science.
Computer Communication Networks.
Computer Systems Organization and Communication Networks.
Systems and Data Security.
Engineering.
Cryptography.
Cyberspace- Security measures.
Machine learning.
Cooperating objects (Computer systems)- Security measures.
Cybercrime.
Internet- Security measures.
Artificial intelligence.
Digital forensic science.