Languages
Jump To : Overview | Titles | Subjects

Bertino, Elisa.

Overview
Works: 5 works in 14 publications in 1 languages
Titles
Computer security - ESORICS 2021 = 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021 : proceedings.. Part I / by: European Symposium on Research in Computer Security (2021 :); Bertino, Elisa.; Shulman, Haya.; Waidner, Michael.; SpringerLink (Online service) (Electronic resources)
Advances in database technology--EDBT 2004 = 9th International Conference on Extending Database Technology : Herakleion, Crete, Greece, March 14-18, 2004 : proceedings / by: Bertino, Elisa.; SpringerLink (Online service); International Conference on Extending Database Technology (2004 :) (Language materials, printed)
Data protection from insider threats by: Bertino, Elisa. (Electronic resources)
Cyber security meets machine learning by: Chen, Xiaofeng.; Susilo, Willy.; Bertino, Elisa.; SpringerLink (Online service) (Electronic resources)
Policy-based autonomic data governance by: Calo, Seraphin.; Bertino, Elisa.; Verma, Dinesh.; SpringerLink (Online service) (Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part I / by: International Conference on Artificial Intelligence and Security (2020 :); Sun, Xingming.; Wang, Jinwei.; Bertino, Elisa.; SpringerLink (Online service) (Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part I / by: International Conference on Artificial Intelligence and Security (2020 :); Sun, Xingming.; Wang, Jinwei.; Bertino, Elisa.; SpringerLink (Online service) (Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part II / by: International Conference on Artificial Intelligence and Security (2020 :); Sun, Xingming.; Wang, Jinwei.; Bertino, Elisa.; SpringerLink (Online service) (Electronic resources)
Artificial intelligence and security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020 : proceedings.. Part III / by: International Conference on Artificial Intelligence and Security (2020 :); Sun, Xingming.; Wang, Jinwei.; Bertino, Elisa.; SpringerLink (Online service) (Electronic resources)
Network and system security = 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012 : proceedings / by: Xu, Li.; Bertino, Elisa.; Mu, Yi.; SpringerLink (Online service) (Electronic resources)
Show more
Subjects
Computer Applications in Geosciences. Software Engineering. Complex Systems. Computer security. Internal security. Artificial intelligence Mobile and Network Security. Computer networks- Security measures. User-generated content. Information Systems and Communication Service. Cryptology. Data protection Artificial Intelligence (incl. Robotics) Database Management. Management of Computing and Information Systems. Mathematical Applications in Computer Science. Security Science and Technology. Data protection. Autonomic computing. Machine learning- Security measures. Information Systems Applications (incl. Internet) Computing Milieux. Temporal databases Information Storage and Retrieval. Data encryption (Computer science) Principles and Models of Security. Database management Service-oriented architecture (Computer science)- Security measures. Computer networks- Security measures Data Mining and Knowledge Discovery. Social media Anomaly detection (Computer security). Information superhighway- Social aspects. Cloud computing- Security measures Geographic information systems- Congresses. Business Information Systems. Information Systems Applications (incl.Internet) Web services- Security measures. Data Encryption. Artificial Intelligence. Computer security Computer Imaging, Vision, Pattern Recognition and Graphics. Machine Learning. Computer Science. Systems and Data Security. Computer Communication Networks. Public key cryptography. Complex Networks. Physics. Methodology of the Social Sciences. Computer Appl. in Social and Behavioral Sciences. Online identities. Computer Hardware. Application software. Computer networks. Machine learning. Computer System Implementation. Computer Systems Organization and Communication Networks. Object-oriented programming (Computer science) Application software- Security measures. e-Commerce/e-business. Online social networks Knowledge management. Artificial intelligence. Computer Applications.
 
 
Change password
Login