1. Managing cyber threats : issues, approaches, and challenges

by Kumar, Vipin | Lazarevic, Aleksandar | Srivastava, Jaideep.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 305.8 KUM] (1).
2. Data warehousing and data mining techniques for cyber security

by Singhal, Anoop.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.312 SIN] (1).
3. Privacy-preserving data mining : models and algorithms

by Aggarwal, Charu C | Yu, Philip S.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.74 AGG] (1).
4. Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Butterworth-Heinemann, 2003Availability: Items available for loan: [Call number: 005.8 MEN] (1).
5. Applications of data mining in computer security

by Barbara, Daniel | Jajodia, Sushil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Springer, 2009Availability: Items available for loan: [Call number: 006.3 BAR] (1).
6. Machine learning and data mining for computer security : methods and applications

by Maloof, Marcus A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2005Availability: Items available for loan: [Call number: 005.8 MAL] (1).
7. Homomorphic encryption and applications

by Yi, Xun | Paulet, Russell | Bertino, Elisa.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York : Springer International Publishing, 2014Availability: Items available for loan: [Call number: 005.8​2 YIX] (1).
8. Anomaly detection principles and algorithms

by Mehrotra, Kishan G | Mohan, Chilukuri K | Huang, Huaming.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cham : Springer International Publishing, 2017Availability: No items available Checked out (1).
9. Network intrusion detection using deep learning: a feature learning approach

by Kim, Kwangjo | Aminanto, Muhamad Erza [aut] | Tanuwidjaja, Harry Chan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Singapore : Springer, 2018Availability: Items available for loan: [Call number: 006.31 KIM] (1).
10. Exploring malicious hacker communities : toward proactive cyber defence

by Marin, Ericsson | Almukaynizi, Mohammed | Sarkar, Soumajyoti | Nunes, Eric | Shakarian, Jana | Shakarian, Paulo.

Publisher: Cambridge : Cambridge University Press, 2021Availability: Items available for loan: [Call number: 363.325 MAR] (1).

Powered by Koha