921. Machine learning approach to phishing detection and defense

by Akanbi, Oluwatobi Ayodeji | Amiri, Iraj Sadegh [author] | Fazeldehkordi, Elahe [author].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 364.168 AKA] (1).
922. How to attack and defend your website

by Dalziel, Henry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam : Syngress, 2015Availability: Items available for loan: [Call number: 005.8 DAL] (1).
923. Vehicular ad hoc network security and privacy

by Lin, Xiaodong | Lu, Rongxing.

Publisher: New Jersey Wiley 2015Availability: Items available for loan: [Call number: 005.8 LIN] (1).
924. Introduction to modern cryptography

by Katz, Jonathan | Lindell, Yehuda.

Edition: 2nd ed. Publisher: Boca Raton: CRC Press, 2015Availability: Items available for loan: [Call number: 005.8 KAT] (2).
925. Cryptography and secure communication

by Blahut, Richard E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: Cambridge University Press, 2014Availability: Items available for loan: [Call number: 005.82 BLA] (1).
926. Data science for cyber-security

by Heard, Nick | Rubin-Delanchy, Patrick | Adams,Niall | Turcotte, Melissa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey : World Scientific, 2018Availability: Items available for loan: [Call number: 005.8 HEA] (1).
927. Learning-based VANET Communication and Security Techniques

by Xiao, Liang | Zhuang, Weihua [aut] | Zhou, Sheng [aut] | Chen, Cailian [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 004.6 XIA] (1).
928. Wireless powered communication networks : from security challenges to IoT applications

by Jamalipour, Abbas | Bi, Ying [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Switzerland : Springer, 2019Availability: Items available for loan: [Call number: 621.382 JAM] (1).
929. Wireless communications under hostile jamming : security and efficiency

by Li, Tongtong | Song, Tianlong [aut] | Liang, Yuan [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 005.8 LIT] (1).
930. Network intrusion detection using deep learning: a feature learning approach

by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
931. Compressed sensing for privacy-preserving data processing

by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
932. Secure networked inference with unreliable data sources

by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
933. Information theoretic security and privacy of information systems

by Schaefer, Rafael F | Boche, Holger.

Publisher: Cambridge Cambridge University Press 2017Availability: Items available for loan: [Call number: 621.384 SCH] (1).
934. Blockchain for distributed systems security

by Shetty, Sachin S.

Publisher: Hoboken Wiley 2019Availability: Items available for loan: [Call number: 005.74 SHE] (1).
935. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
936. Intelligent copyright protection for images

by Roy, Subhrajit Sinha | Basu, Abhishek | Chattopadhyay, Avik.

Publisher: Boca Raton Chapman and Hall/CRC 2019Availability: Items available for loan: [Call number: 346.0482 ROY] (1).
937. Secure multiparty computation and secret sharing

by Cramer, Ronald | Damgaard, Ivan | Nielsen, Jesper Buus.

Publisher: New York Cambridge University Press 2015Availability: Items available for loan: [Call number: 005.8 CRA] (1).
938. Permanent record

by Snowden, Edward.

Publisher: London Macmillan 2019Availability: Items available for loan: [Call number: 327.12730092 SNO] (1).
939. Machine learning for computer and cyber security : principle algorithms and practices

by Gupta, Brij B | Sheng, Michael.

Publisher: United States CRC Press 2019Availability: Items available for loan: [Call number: 006.31 GUP] (1).
940. New solutions for cybersecurity

by Shrobe, Howard | Shrier, David L | Pentland, Alex.

Publisher: London MIT Press 2017Availability: Items available for loan: [Call number: 658.478 SHR] (1).

Powered by Koha