DocumentCode :
244809
Title :
Table of contents
fYear :
2014
fDate :
20-23 Dec. 2014
Abstract :
The following topics are dealt with: data integrity; iris features; cloud computing; port hopping; moving target defense; anonymized WiFi access point BSSID; e-navigation environment; cyber physical system security theories; sensitive information system security model analysis; dimensionality reduction methods; biometric recognition; anonymous network topology; and anonymous communication network attacks.
Keywords :
cloud computing; computer network security; data integrity; iris recognition; telecommunication network topology; wireless LAN; advanced evasion techniques; anonymized WiFi access point BSSID; anonymous communication network attacks; anonymous network topology; biometric recognition; cloud computing; combinatorial search; cyber physical system security theories; data integrity; dimensionality reduction methods; e-navigation environment; iris features; moving target defense; port hopping; sensitive information system security model analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology (SecTech), 2014 7th International Conference on
Conference_Location :
Haikou
Print_ISBN :
978-1-4799-7775-8
Type :
conf
DOI :
10.1109/SecTech.2014.4
Filename :
7023268
Link To Document :
بازگشت