in.nau.edu/cybersecurity/publications
Preview meta tags from the in.nau.edu website.
Linked Hostnames
7- 66 links toin.nau.edu
- 5 links todoi.org
- 4 links tonau.edu
- 1 link todx.doi.org
- 1 link tojan.ucc.nau.edu
- 1 link tolink.springer.com
- 1 link towww.csiac.org
Search Engine Appearance
https://in.nau.edu/cybersecurity/publications
Cybersecurity Publications | Cybersecurity
This is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures.
Bing
Cybersecurity Publications | Cybersecurity
https://in.nau.edu/cybersecurity/publications
This is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures.
DuckDuckGo
Cybersecurity Publications | Cybersecurity
This is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures.
General Meta Tags
6- titleCybersecurity Publications | Cybersecurity
- charsetUTF-8
- viewportwidth=device-width
- descriptionThis is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures.
- msapplication-confighttps://in.nau.edu/wp-content/plugins/nau-core/favicons/browserconfig.xml
Open Graph Meta Tags
6- og:typewebsite
og:locale
en_US- og:site_nameCybersecurity
- og:titleCybersecurity Publications | Cybersecurity
- og:descriptionThis is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures. For more detail regarding the publications please reach…
Twitter Meta Tags
3- twitter:cardsummary_large_image
- twitter:titleCybersecurity Publications | Cybersecurity
- twitter:descriptionThis is a full inventory of NAU’s Cybersecurity Research program publications, granted patents and currently pending patents and disclosures. For more detail regarding the publications please reach…
Link Tags
30- EditURIhttps://in.nau.edu/cybersecurity/xmlrpc.php?rsd
- alternatehttps://in.nau.edu/cybersecurity/wp-json/wp/v2/pages/9
- alternatehttps://in.nau.edu/cybersecurity/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fin.nau.edu%2Fcybersecurity%2Fpublications%2F
- alternatehttps://in.nau.edu/cybersecurity/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fin.nau.edu%2Fcybersecurity%2Fpublications%2F&format=xml
- apple-touch-iconhttps://in.nau.edu/wp-content/plugins/nau-core/favicons/apple-touch-icon.png
Emails
1Links
79- http://dx.doi.org/10.1117/12.3011855
- https://doi.org/10.1007/978-3-031-10467-1_33
- https://doi.org/10.1117/12.2660903
- https://doi.org/10.1117/12.2662848
- https://doi.org/10.3390/cryptography4020017