Search results for: Wang, Lingyu
Showing 1 - 11 results of 11
Refine Results
-
1
Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications
Authors: Liu, Wen Ming, Wang, Lingyu
Published: Springer International Publishing : Imprint: Springer, 2016Holdings: Loading…Springer Computer Science eBooks 2016 English/International: 2016 (Springer Link)
Electronic eBook -
2
Network Security Metrics
Authors: Wang, Lingyu, Jajodia, Sushil, Singhal, Anoop
Published: Springer International Publishing : Imprint: Springer, 2017Holdings: Loading…Springer Computer Science eBooks 2017 English/International: 2017 (Springer Link)
Electronic eBook -
3
Network Hardening An Automated Approach to Improving Network Security
Authors: Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published: Springer International Publishing : Imprint: Springer, 2014Holdings: Loading…Springer English/International eBooks 2014 - Full Set: 2014 (Springer Link)
Electronic eBook -
4
Preserving Privacy in On-Line Analytical Processing (OLAP)
Authors: Wang, Lingyu, Jajodia, Sushil, Wijesekera, Duminda
Published: Springer US : Imprint: Springer, 2007Holdings: Loading…Springer English/International eBooks 2007 - Full Set: 2007 (Springer Link)
Electronic eBook -
5
Aspect-Oriented Security Hardening of UML Design Models
Authors: Mouheb, Djedjiga, Debbabi, Mourad, Pourzandi, Makan, Wang, Lingyu, Nouh, Mariam, Ziarati, Raha, Alhadidi, Dima, Talhi, Chamseddine, Lima, Vitor
Published: Springer International Publishing : Imprint: Springer, 2015Holdings: Loading…Springer English/International eBooks 2015 - Full Set: 2015 (Springer Link)
Electronic eBook -
6
Cloud Security Auditing
Authors: Majumdar, Suryadipta, Madi, Taous, Wang, Yushun, Tabiban, Azadeh, Oqaily, Momen, Alimohammadifar, Amir, Jarraya, Yosr, Pourzandi, Makan, Wang, Lingyu, Debbabi, Mourad
Published: Springer International Publishing : Imprint: Springer, 2019Holdings: Loading…Springer Computer Science eBooks 2019 English/International: 2019 (Springer Link)
Electronic eBook -
7
Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting
Authors: Alrabaee, Saed, Debbabi, Mourad, Shirani, Paria, Wang, Lingyu, Youssef, Amr, Rahimian, Ashkan, Nouh, Lina, Mouheb, Djedjiga, Huang, He, Hanna, Aiman
Published: Springer International Publishing : Imprint: Springer, 2020Holdings: Loading…Springer Computer Science eBooks 2020 English/International: 2020 (Springer Link)
Electronic eBook -
8
Data and applications security and privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSEC 2013, Newark, NJ, USA, July 15-17, 2013 : Proceedings
Published: Springer, 2013Other Authors: “…Wang, Lingyu…”
Holdings: Loading…Springer English/International eBooks 2013 - Full Set: 2013 (Springer Link)
Electronic Conference Proceeding eBook -
9
Information Security Management, Education and Privacy IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France
Published: Springer US : Imprint: Springer, 2004Other Authors:Holdings: Loading…EBSCO eBooks: 2004 (EBSCO)
Electronic eBook -
10
Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers
Published: Springer International Publishing : Imprint: Springer, 2017Other Authors:Holdings: Loading…Springer Computer Science eBooks 2017 English/International: 2017 (Springer Link)
Electronic eBook -
11
Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
Published: Springer International Publishing : Imprint: Springer, 2019Other Authors:Holdings: Loading…Springer Computer Science eBooks 2019 English/International: 2019 (Springer Link)
Electronic eBook
Related Subjects
Data protection
Computer networks
Cryptography
Data encryption (Computer science)
Application software
Biometric identification
Information theory
Algorithms
Coding theory
Computer crimes
Computer engineering
Computer networks—Security measures
Computer security
Data structures (Computer science)
Database management
Database security
Electronic data processing—Management
Internet
Machine learning
Security measures
Software engineering
Telecommunication