81. Security and privacy in cyber-physical systems : foundations, principles, and applications

by Song, Houbing Editor [edt] | Fink, Glenn A [edt] | Jeschke, Sabina [edt].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hobokon : Wiley, 2018Availability: Items available for loan: [Call number: 005.8 SON] (1).
82. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: Items available for loan: [Call number: 006.312 MEH] (1).
83. Differential privacy : from theory to practice

by Li, Ninghui | Lyu, Min | Su, Dong | Yang, Weining.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: S.l. : Morgan & Claypool Publishers , 2017Availability: Items available for loan: [Call number: 005.80151 LIN] (1).
84. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
85. Data science for cyber-security

by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
86. Edge computing : a primer

by Cao, Jie | Zhang, Quan [aut] | Shi, Weisong [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2018Availability: No items available Checked out (1).
87. Learning-based VANET Communication and Security Techniques

by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).
88. Compressed sensing for privacy-preserving data processing

by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
89. Secure networked inference with unreliable data sources

by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
90. Cellular convergence and the death of privacy

by Wicker, Stephen B.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Oxford University Press, 2013Availability: Items available for loan: [Call number: 342.7308​58 WIC] (1).
91. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
92. Access rules : freeing data from big tech for a better future

by Mayer-Schonberger, Viktor | Ramge, Thomas.

Publisher: California : University of California Press, 2022Availability: Items available for loan: [Call number: 005.7 MAY] (1).
93. Privacy is hard and seven other myths : achieving privacy through careful design

by Hoepman, Jaap-Henk.

Publisher: Cambridge : MIT Press, 2021Availability: Items available for loan: [Call number: 005.8 HOE] (1).
94. Privacy and data protection in software services

by Senigaglia, Roberto ed | Irti, Claudia [ed.] | Bernes, Alessandro [ed.].

Publisher: Singapore : Springer, 2022Availability: Items available for loan: [Call number: 005.8 SEN] (1).
95. Protecting privacy through homomorphic encryption

by Lauter, Kristin E [ed.] | Dai, Wei [ed.] | Laine, Kim [ed.].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 LAU] (1).
96. Big breaches : cybersecurity lessons for everyone

by Daswani, Neil | Elbayadi, Moudy.

Publisher: California : Apress, 2021Availability: Items available for loan: [Call number: 005.8 DAS] (1).
97. The privacy fallacy : harm and power in the information economy

by Cofone, Ignacio N.

Publisher: Cambridge : Cambridge University Press, 2023Availability: Items available for loan: [Call number: 323.44 COF] (1).

Powered by Koha