語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
Advances in Information Security, ;
書目資訊
Applications of data mining in compu...
~
Barbara, Daniel.
Applications of data mining in computer security /
by:
Barbara, Daniel.
Primality testing and integer factor...
~
Yan, Song Y.
Primality testing and integer factorization in public-key cryptography /
by:
Yan, Song Y.
Information hiding :steganography an...
~
Duric, Zoran.
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
Duric, Zoran.
Data warehousing and data mining tec...
~
Singhal, Anoop, (1958-)
Data warehousing and data mining techniques for cyber security /
by:
Singhal, Anoop, (1958-)
Malware detection /
~
Christodorescu, Mihai.
Malware detection /
by:
Christodorescu, Mihai.
Network intrusion detection and prev...
~
Ghorbani, Ali, (1954-)
Network intrusion detection and prevention :concepts and techniques /
by:
Ghorbani, Ali, (1954-)
Touchless palmprint recognition systems
~
Genovese, Angelo.
Touchless palmprint recognition systems
by:
Genovese, Angelo.
Cybersecurity systems for human cogn...
~
Kott, Alexander.
Cybersecurity systems for human cognition augmentation
by:
Kott, Alexander.
Cyber threat intelligence
~
Conti, Mauro.
Cyber threat intelligence
by:
Conti, Mauro.
Smart micro-grid systems security an...
~
Kayem, Anne V. D. M.
Smart micro-grid systems security and privacy
by:
Kayem, Anne V. D. M.
Versatile cybersecurity
~
Conti, Mauro.
Versatile cybersecurity
by:
Conti, Mauro.
Malicious attack propagation and sou...
~
Jiang, Jiaojiao.
Malicious attack propagation and source identification
by:
Jiang, Jiaojiao.
Proactive and dynamic network defense
~
Lu, Zhuo.
Proactive and dynamic network defense
by:
Lu, Zhuo.
Intrusion Detection Systems
~
Di Pietro, Roberto.
Intrusion Detection Systems
by:
Di Pietro, Roberto.
Cryptography arithmeticalgorithms an...
~
Omondi, Amos R.
Cryptography arithmeticalgorithms and hardware architectures /
by:
Omondi, Amos R.
Blockchain cybersecurity, trust and ...
~
Choo, Kim-Kwang Raymond.
Blockchain cybersecurity, trust and privacy
by:
Choo, Kim-Kwang Raymond.
Binary code fingerprinting for cyber...
~
Alrabaee, Saed.
Binary code fingerprinting for cybersecurityapplication to malicious code fingerprinting /
by:
Alrabaee, Saed.
Multivariate public key cryptosystems
~
Ding, Jintai.
Multivariate public key cryptosystems
by:
Ding, Jintai.
Cloud security auditing
~
Majumdar, Suryadipta.
Cloud security auditing
by:
Majumdar, Suryadipta.
Industrial control systems security ...
~
Rieger, Craig.
Industrial control systems security and resiliencypractice and theory /
by:
Rieger, Craig.
處理中
...
變更密碼
登入