|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IP Mobility Management for VANET
by Taha, Sanaa.
Publication:
. IX, 106 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security for Wireless Implantable Medical Devices
by Hei, Xiali.
Publication:
. XI, 45 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automatic Malware Analysis
by Yin, Heng.
Publication:
. IX, 73 p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Authentication
by Jakobsson, Markus.
Publication:
. XIV, 113 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Survey of Data Leakage Detection and Prevention Solutions
by Shabtai, Asaf.
Publication:
. VIII, 92 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bootstrapping Trust in Modern Computers
by Parno, Bryan.
Publication:
. IX, 101p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Similarity and Classification
by Cesare, Silvio.
Publication:
. XIV, 88p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|