101. Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications

by Möller, Dietmar P. F | Haas, Roland E.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
102. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
103. Wireless communications under hostile jamming : security and efficiency

by Li, Tongtong | Song, Tianlong [aut] | Liang, Yuan [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 005.8 LIT] (1).
104. Network intrusion detection using deep learning: a feature learning approach

by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
105. Compressed sensing for privacy-preserving data processing

by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
106. Secure networked inference with unreliable data sources

by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut].

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
107. Cryptology transmitted message protection : from deterministic chaos up to optical vortices

by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey.

Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
108. Quantum cryptography : from key distribution to conference key agreement

by Grasselli, Federico.

Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
109. Ethical and secure computing : a concise module

by Kizza, Joseph Migga.

Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
110. Secure MultiParty Computation Against Passive Adversaries

by Choudhury, Ashish | Patra, Arpita.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 005.8 CHO] (1).
111. Trusted cellular IoT devices : design ingredients and concepts

by Heins, Kersten.

Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
112. Introduction to cybersecurity : a multidisciplinary challenge

by Sharp, Robin.

Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 SHA] (1).
113. Understanding logic locking

by Zamiri Azar, Kimia | Mardani Kamali, Hadi | Farahmandi, Farimah | Tehranipoor, Mark.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer, 2024Availability: Items available for loan: [Call number: 005.8 ZAM] (1).

Powered by Koha