Showing 1 - 8 results of 8
Refine Results
-
1
-
2
-
3EbookCall Number: Loading...
Located: Loading... -
4EbookCall Number: Loading...
Located: Loading... -
5by Majumdar, Suryadipta, Alimohammadifar, Amir, Debbabi, Mourad, Jarraya, Yosr, Madi, Taous, Oqaily, Momen, Pourzandi, Makan, Tabiban, Azadeh, Wang, Lingyu, Wang, Yushun
Published 2019EbookCall Number: Loading...
Located: Loading... -
6by Alrabaee, Saed, Debbabi, Mourad, Hanna, Aiman, Huang, He, Mouheb, Djedjiga, Nouh, Lina, Rahimian, Ashkan, Shirani, Paria, Wang, Lingyu, Youssef, Amr M.
Published 2020EbookCall Number: Loading...
Located: Loading... -
7Published 2019EbookCall Number: Loading...
Located: Loading... -
8Published 2014EbookCall Number: Loading...
Located: Loading...
Search Tools:
RSS Feed
–
Email Search
Related Subjects
Computer security
Computer networks
Data encryption (Computer science)
Machine learning
Access control
Authorship
Cloud computing
Computer crimes
Computer software
Data mining
Data processing
Investigation
Java (Computer program language)
Malware (Computer software)
Mobile computing
Portable computers
Security measures
Systems engineering
Validation
Verification