Linked e-resources
Details
Table of Contents
Part 1: Cybersecurity and Cyberdefense
Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks
Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs
Chapter 3. Cybernetic Dependency Capacity
Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens
Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Chapter 6. Is Cyber Warfare an Alternative?
Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment
Chapter 8. Mobile Communication Systems Evolution and Security
Part 2: Computer Networks, Mobility and Pervasive Systems
Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats
Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.
Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks
Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs
Chapter 3. Cybernetic Dependency Capacity
Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens
Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
Chapter 6. Is Cyber Warfare an Alternative?
Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment
Chapter 8. Mobile Communication Systems Evolution and Security
Part 2: Computer Networks, Mobility and Pervasive Systems
Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats
Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.