Search Results - Wang, Cliff
- Showing 1 – 20 results of 21
- Go to Next Page
-
1Fundamentals of Sketch-Based Passwords: A General FrameworkPublished 2014Call Number: Loading…Read online Table of Contents
Located: Loading…Electronic eBook Loading… -
2Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile ApplicationsPublished 2015Call Number: Loading…Table of Contents Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
3Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile DevicesPublished 2014Call Number: Loading…Read online (LMU) Available at the library of LMU.
Located: Loading…Electronic eBook Loading… -
4Autonomous cyber deception: reasoning, adaptive planning, and evaluation of HoneyThingsPublished 2019Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
5Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber ThreatsPublished 2007Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
6Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber ThreatsPublished 2007Call Number: Loading…
Located: Loading…
Electronic eBook Loading… -
7AI Embedded Assurance for Cyber SystemsPublished 2023Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
8Theory and models for cyber situation awarenessPublished 2017Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
9Adversarial and uncertain reasoning for adaptive cyber defense: control- and game-theoretic approaches to cyber securityPublished 2019Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online
Located: Loading…Electronic eBook Loading… -
10Proactive and dynamic network defensePublished 2019Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
11Cyber Deception: Techniques, Strategies, and Human AspectsPublished 2023Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
12Cyber Defense and Situational AwarenessPublished 2014Other Authors: “…Wang, Cliff…”
Call Number: Loading…Table of Contents Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
13Digital fingerprintingPublished 2016Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
14Cyber deception: building the scientific foundationPublished 2016Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
15Secure Cloud ComputingPublished 2014Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
16Adaptive autonomous secure cyber systemsPublished 2020Other Authors: “…Wang, Cliff…”
Call Number: Loading…Read online (LMU) Available at the library of LMU. Read online (HM) Available at the library of Hochschule Munich University of Applied Sciences (HM).
Located: Loading…Electronic eBook Loading… -
17Proactive and dynamic network defensePublished 2019Other Authors: “…Wang, Cliff…”
Call Number: Loading…
Located: Loading…
Book Loading… -
18Securing Wireless Sensor NetworksPublished 2007Other Authors: “…Wang, Cliff…”
Call Number: Loading…
Located: Loading…
Book Loading… -
19Theory and models for cyber situation awarenessPublished 2017Other Authors: “…Wang, Cliff…”
Call Number: Loading…
Located: Loading…Book Loading… -
20Digital fingerprintingPublished 2016Other Authors: “…Wang, Cliff…”
Call Number: Loading…
Located: Loading…
Book Loading…