1325 results in Communications, Information Theory and Security
4 - Secret-key capacity
- from Part II - Information-theoretic security
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 112-176
-
- Chapter
- Export citation
Author index
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 323-325
-
- Chapter
- Export citation
Part I - Preliminaries
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp 1-2
-
- Chapter
- Export citation
Notation
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp xiii-xiv
-
- Chapter
- Export citation
List of abbreviations
-
- Book:
- Physical-Layer Security
- Published online:
- 07 October 2011
- Print publication:
- 22 September 2011, pp xv-xvi
-
- Chapter
- Export citation
Part IV - Security attack and intrusion detection
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 217-218
-
- Chapter
- Export citation
Notation
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp xvii-xviii
-
- Chapter
- Export citation
Part I - Introduction
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 1-2
-
- Chapter
- Export citation
1 - Introduction
- from Part I - Introduction
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 3-19
-
- Chapter
- Export citation
9 - Machine learning for intrusion and anomaly detection
- from Part IV - Security attack and intrusion detection
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 219-243
-
- Chapter
- Export citation
Part II - Security games
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 37-38
-
- Chapter
- Export citation
6 - Security risk-management
- from Part III - Decision making for network security
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 133-165
-
- Chapter
- Export citation
3 - Deterministic security games
- from Part II - Security games
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 39-73
-
- Chapter
- Export citation
Part III - Decision making for network security
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 131-132
-
- Chapter
- Export citation
Acknowledgments
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp xv-xv
-
- Chapter
- Export citation
2 - Network security concepts
- from Part I - Introduction
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 20-36
-
- Chapter
- Export citation
8 - Usability, trust, and privacy
- from Part III - Decision making for network security
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 189-216
-
- Chapter
- Export citation
10 - Hypothesis testing for attack detection
- from Part IV - Security attack and intrusion detection
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 244-273
-
- Chapter
- Export citation
4 - Stochastic security games
- from Part II - Security games
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 74-97
-
- Chapter
- Export citation
5 - Security games with information limitations
- from Part II - Security games
-
- Book:
- Network Security
- Published online:
- 02 December 2010
- Print publication:
- 21 October 2010, pp 98-130
-
- Chapter
- Export citation