Advances in Information Security,

書目資訊

Applications of data mining in compu...
Barbara, Daniel.
Primality testing and integer factor...
Yan, Song Y.
Information hiding :steganography an...
Duric, Zoran.
Data warehousing and data mining tec...
Singhal, Anoop, (1958-)
Malware detection /
Christodorescu, Mihai.
by: Christodorescu, Mihai.
Network intrusion detection and prev...
Ghorbani, Ali, (1954-)
Touchless palmprint recognition systems
Genovese, Angelo.
Cybersecurity systems for human cogn...
Kott, Alexander.
Cyber threat intelligence
Conti, Mauro.
by: Conti, Mauro.
Smart micro-grid systems security an...
Kayem, Anne V. D. M.
Versatile cybersecurity
Conti, Mauro.
by: Conti, Mauro.
Malicious attack propagation and sou...
Jiang, Jiaojiao.
Proactive and dynamic network defense
Lu, Zhuo.
Intrusion Detection Systems
Di Pietro, Roberto.
by: Di Pietro, Roberto.
Cryptography arithmeticalgorithms an...
Omondi, Amos R.
Blockchain cybersecurity, trust and ...
Choo, Kim-Kwang Raymond.
Binary code fingerprinting for cyber...
Alrabaee, Saed.
Multivariate public key cryptosystems
Ding, Jintai.
Cloud security auditing
Majumdar, Suryadipta.
by: Majumdar, Suryadipta.
Industrial control systems security ...
Rieger, Craig.
 
 
Change password
Login