|
921.
|
Machine learning approach to phishing detection and defense
by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
|
|
922.
|
How to attack and defend your website
by Dalziel, Henry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
|
|
923.
|
Vehicular ad hoc network security and privacy
by Lin, Xiaodong | Lu, Rongxing. Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
|
|
924.
|
Introduction to modern cryptography
by Katz, Jonathan | Lindell, Yehuda. Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
|
|
925.
|
Cryptography and secure communication
by Blahut, Richard E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
|
|
926.
|
Data science for cyber-security
by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
|
|
927.
|
Learning-based VANET Communication and Security Techniques
by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).
|
|
928.
|
Wireless powered communication networks : from security challenges to IoT applications
by Jamalipour, Abbas | Bi, Ying [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 621.382 JAM] (1).
|
|
929.
|
Wireless communications under hostile jamming : security and efficiency
by Li, Tongtong | Song, Tianlong [aut] | Liang, Yuan [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 005.8 LIT] (1).
|
|
930.
|
Network intrusion detection using deep learning: a feature learning approach
by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
|
|
931.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
932.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
933.
|
Information theoretic security and privacy of information systems
by Schaefer, Rafael F | Boche, Holger. Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
|
|
934.
|
Blockchain for distributed systems security
by Shetty, Sachin S. Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
|
|
935.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
936.
|
Intelligent copyright protection for images
by Roy, Subhrajit Sinha | Basu, Abhishek | Chattopadhyay, Avik. Publisher: Boca Raton Chapman and Hall/CRC 2019Availability: Items available for loan: [Call number: 346.0482 ROY] (1).
|
|
937.
|
Secure multiparty computation and secret sharing
by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus. Publisher: New York Cambridge University Press 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
|
|
938.
|
Permanent record
by Snowden, Edward. Publisher: London Macmillan 2019Availability: Items available for loan: [Call number: 327.12730092 SNO] (1).
|
|
939.
|
Machine learning for computer and cyber security : principle algorithms and practices
by Gupta, Brij B | Sheng, Michael. Publisher: United States CRC Press 2019Availability: Items available for loan: [Call number: 006.31 GUP] (1).
|
|
940.
|
New solutions for cybersecurity
by Shrobe, Howard | Shrier, David L | Pentland, Alex. Publisher: London MIT Press 2017Availability: Items available for loan: [Call number: 658.478 SHR] (1).
|