|
81.
|
Security and privacy in cyber-physical systems : foundations, principles, and applications
by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
|
|
82.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).
|
|
83.
|
Differential privacy : from theory to practice
by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
|
|
84.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
85.
|
Data science for cyber-security
by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
|
|
86.
|
Edge computing : a primer
by Cao, Jie | Zhang, Quan [aut] | Shi, Weisong [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2018Availability: No items available Checked out (1).
|
|
87.
|
Learning-based VANET Communication and Security Techniques
by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).
|
|
88.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
89.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
90.
|
Cellular convergence and the death of privacy
by Wicker, Stephen B. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Oxford University Press, 2013Availability: Items available for loan: [Call number: 342.730858 WIC] (1).
|
|
91.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
92.
|
Access rules : freeing data from big tech for a better future
by Mayer-Schonberger, Viktor | Ramge, Thomas. Publisher: California : University of California Press, 2022Availability: Items available for loan: [Call number: 005.7 MAY] (1).
|
|
93.
|
Privacy is hard and seven other myths : achieving privacy through careful design
by Hoepman, Jaap-Henk. Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
|
|
94.
|
Privacy and data protection in software services
by Senigaglia, Roberto ed | Irti, Claudia [ed.] | Bernes, Alessandro [ed.]. Publisher: Singapore : Springer, 2022Availability: Items available for loan: [Call number: 005.8 SEN] (1).
|
|
95.
|
Protecting privacy through homomorphic encryption
by Lauter, Kristin E [ed.] | Dai, Wei [ed.] | Laine, Kim [ed.]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 LAU] (1).
|
|
96.
|
Big breaches : cybersecurity lessons for everyone
by Daswani, Neil | Elbayadi, Moudy. Publisher: California : Apress, 2021Availability: Items available for loan: [Call number: 005.8 DAS] (1).
|
|
97.
|
The privacy fallacy : harm and power in the information economy
by Cofone, Ignacio N. Publisher: Cambridge : Cambridge University Press, 2023Availability: Items available for loan: [Call number: 323.44 COF] (1).
|