Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
The research scope of database security has expanded greatly, due to the rapid development of the...
International Federation for Information Processing
Location-based applications refer to those that use location data in a prominent manner. Location...
The Handbook of Database Security: Applications & Trends, an edited volume by renowned researcher...
Today, when a security accident occurs, the top three questions security administrators would ask...
On-Line Analytic Processing (OLAP) systems usually need to meet two conflicting goals. First, the...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This Springer Brief examines the tools based on attack graphs that help reveal network hardening ...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This edited volume features a wide spectrum of the latest computer science research relating to c...