Arama Sonuçları Wang, Cliff.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWang$00252C$002bCliff.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2024-11-29T10:27:38Z
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Introduction to Hardware Security and Trust
ent://SD_ILS/0/SD_ILS:173063
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Tehranipoor, Mohammad. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-8080-9">http://dx.doi.org/10.1007/978-1-4419-8080-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Deception Techniques, Strategies, and Human Aspects
ent://SD_ILS/0/SD_ILS:520297
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Bao, Tiffany. editor. Tambe, Milind. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası XX(520297.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-031-16613-6">https://doi.org/10.1007/978-3-031-16613-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings
ent://SD_ILS/0/SD_ILS:482942
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Al-Shaer, Ehab. editor. Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386 Hamlen, Kevin W. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security
ent://SD_ILS/0/SD_ILS:483947
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Cybenko, George. editor. Liu, Peng. editor. Wang, Cliff. editor. Wellman, Michael. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Warfare Building the Scientific Foundation
ent://SD_ILS/0/SD_ILS:518532
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. Shakarian, Paulo. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası XX(518532.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-14039-1">https://doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
ent://SD_ILS/0/SD_ILS:518429
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Lu, Zhou. author. Wang, Wenye. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası XX(518429.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-23288-1">https://doi.org/10.1007/978-3-319-23288-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Defense and Situational Awareness
ent://SD_ILS/0/SD_ILS:485697
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Kott, Alexander. editor. Wang, Cliff. editor. Erbacher, Robert F. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Fundamentals of Sketch-Based Passwords A General Framework
ent://SD_ILS/0/SD_ILS:487393
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Riggan, Benjamin S. author. Snyder, Wesley E. author. Wang, Cliff. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure Cloud Computing
ent://SD_ILS/0/SD_ILS:487956
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. Kant, Krishna. editor. Samarati, Pierangela. editor. Singhal, Anoop. editor. Swarup, Vipin. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE(331766.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats
ent://SD_ILS/0/SD_ILS:173823
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Swarup, Vipin. editor. Wang, Cliff. editor. Wang, X. Sean. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ent://SD_ILS/0/SD_ILS:166337
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Poovendran, Radha. editor. Roy, Sumit. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malware Detection
ent://SD_ILS/0/SD_ILS:166294
2024-11-29T10:27:38Z
2024-11-29T10:27:38Z
Yazar Christodorescu, Mihai. editor. Jha, Somesh. editor. Maughan, Douglas. editor. Song, Dawn. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>