|
1.
|
Managing cyber threats : issues, approaches, and challenges
by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
|
|
2.
|
Data warehousing and data mining techniques for cyber security
by Singhal, Anoop. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
|
|
3.
|
Privacy-preserving data mining : models and algorithms
by Aggarwal, Charu C | Yu, Philip S. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
|
|
4.
|
Investigative data mining for security and criminal detection
by Mena, Jesus. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
|
|
5.
|
Applications of data mining in computer security
by Barbara, Daniel | Jajodia, Sushil. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
|
|
6.
|
Machine learning and data mining for computer security : methods and applications
by Maloof, Marcus A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
|
|
7.
|
Homomorphic encryption and applications
by Yi, Xun | Paulet, Russell | Bertino, Elisa. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.82 YIX] (1).
|
|
8.
|
Anomaly detection principles and algorithms
by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
|
|
9.
|
Network intrusion detection using deep learning: a feature learning approach
by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
|
|
10.
|
Exploring malicious hacker communities : toward proactive cyber defence
by Marin, Ericsson | Almukaynizi, Mohammed | Sarkar, Soumajyoti | Nunes, Eric | Shakarian, Jana | Shakarian, Paulo. Publisher: Cambridge : Cambridge University Press, 2021Availability: Items available for loan: [Call number: 363.325 MAR] (1).
|