|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sustainable Wireless Networks
by Zheng, Zhongming.
Publication:
. IX, 59 p. 24 illus., 3 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Center Networks
by Liu, Yang.
Publication:
. XII, 68 p. 16 illus., 15 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IP Mobility Management for VANET
by Taha, Sanaa.
Publication:
. IX, 106 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Virtualization
by Wen, Heming.
Publication:
. XIV, 112 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
4G Femtocells
by Zhang, Haijun.
Publication:
. IX, 77 p. 21 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Hash Table
by Zhang, Hao.
Publication:
. VIII, 67 p. 15 illus., 3 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Management in Utility and Cloud Computing
by Zhao, Han.
Publication:
. XII, 82 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cognitive Virtual Network Operator Games
by Duan, Lingjie.
Publication:
. VIII, 74 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Studies on Urban Vehicular Ad-hoc Networks
by Zhu, Hongzi.
Publication:
. IX, 124 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Android Malware
by Jiang, Xuxian.
Publication:
. XI, 44 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modeling Trust Context in Networks
by Adali, Sibel.
Publication:
. VI, 83 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Space-Time Coding
by Jing, Yindi.
Publication:
. XIV, 108 p. 21 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Medium Access Control in Wireless Networks
by Wang, Ping.
Publication:
. XII, 109 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|