|
101.
|
Guide to automotive connectivity and cybersecurity : trends, technologies, innovations and applications
by Möller, Dietmar P. F | Haas, Roland E. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2019Availability: Items available for loan: [Call number: 338.476292 MOL] (1).
|
|
102.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
103.
|
Wireless communications under hostile jamming : security and efficiency
by Li, Tongtong | Song, Tianlong [aut] | Liang, Yuan [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 005.8 LIT] (1).
|
|
104.
|
Network intrusion detection using deep learning: a feature learning approach
by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
|
|
105.
|
Compressed sensing for privacy-preserving data processing
by Testa, Matteo | Valsesia, Diego [aut] | Bianchi, Tiziano [aut] | Magli, Enrico [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2019Availability: Items available for loan: [Call number: 621.3822 TES] (1).
|
|
106.
|
Secure networked inference with unreliable data sources
by Vempaty, Aditya | Kailkhura, Bhavya [aut] | Varshney, Pramod K [aut]. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 004.36 VEM] (1).
|
|
107.
|
Cryptology transmitted message protection : from deterministic chaos up to optical vortices
by Izmailov, Igor | Poizner, Boris | Romanov, Ilia | Smolskiy, Sergey. Publisher: Switzerland Springer 2016Availability: Items available for loan: [Call number: 005.82 IZM] (1).
|
|
108.
|
Quantum cryptography : from key distribution to conference key agreement
by Grasselli, Federico. Publisher: Cham : Springer, 2021Availability: Items available for loan: [Call number: 005.824 GRA] (1).
|
|
109.
|
Ethical and secure computing : a concise module
by Kizza, Joseph Migga. Edition: 3rd ed. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 KIZ] (1).
|
|
110.
|
Secure MultiParty Computation Against Passive Adversaries
by Choudhury, Ashish | Patra, Arpita. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 005.8 CHO] (1).
|
|
111.
|
Trusted cellular IoT devices : design ingredients and concepts
by Heins, Kersten. Publisher: Cham : Springer, 2022Availability: Items available for loan: [Call number: 004.6782 HEI] (1).
|
|
112.
|
Introduction to cybersecurity : a multidisciplinary challenge
by Sharp, Robin. Publisher: Cham : Springer, 2023Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
113.
|
Understanding logic locking
by Zamiri Azar, Kimia | Mardani Kamali, Hadi | Farahmandi, Farimah | Tehranipoor, Mark. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer, 2024Availability: Items available for loan: [Call number: 005.8 ZAM] (1).
|