Special Issue on Cyber Security and Privacy in Communication Networks

被引:0
|
作者
Gupta, C. P. [1 ]
机构
[1] Rajasthan Tech Univ, Kota, India
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:V / VI
页数:2
相关论文
共 50 条
  • [21] Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks
    Yulei Wu
    Ryan Ko
    Ahmed Al-Dubai
    Wireless Personal Communications, 2014, 75 : 1587 - 1589
  • [22] Special Issue on FinTech Security and Privacy
    Yeh, Kuo-Hui
    Deng, Robert H.
    Kikuchi, Hiroaki
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 112 : 1172 - 1173
  • [23] Introduction to the special issue on cyber security and management
    Frederick T. Sheldon
    J. Todd McDonald
    Information Systems and e-Business Management, 2012, 10 : 429 - 431
  • [24] Special issue on "Towards a Science of Cyber Security"
    Eidenbenz, Stephan
    Marathe, Madhav
    Sen, Arunabha
    COMPUTER NETWORKS, 2013, 57 (10) : 2119 - 2120
  • [25] Introduction to the special issue on cyber security and management
    Sheldon, Frederick T.
    McDonald, J. Todd
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 429 - 431
  • [26] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95
  • [27] Editorial for special issue on privacy and security in wireless sensor and ad hoc networks
    Zhang, Wensheng
    Zhu, Sencun
    Cao, Guohong
    AD HOC NETWORKS, 2009, 7 (08) : 1431 - 1433
  • [28] Editorial: Special Issue on Security and Privacy of IoT
    Hua Wang
    Zonghua Zhang
    Tarek Taleb
    World Wide Web, 2018, 21 : 1 - 6
  • [29] SPECIAL ISSUE ON SECURITY AND PRIVACY IN COMPLEX SYSTEMS
    Jajodia, Sushil
    Samarati, Pierangela
    IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 178 - 178
  • [30] Special Issue on Security and Privacy in Mobile Clouds
    Chow, Sherman S. M.
    Hengartner, Urs
    Liu, Joseph K.
    Ren, Kui
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 100 - 101