Title: Power Analysis Attacks: Revealing the Secrets of Smart Cards, Author: Stefan Mangard
Title: Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, Author: Yang Xu
Title: Malware Analysis Using Artificial Intelligence and Deep Learning, Author: Mark Stamp
Title: Information Security and Cryptology: 20th International Conference, Inscrypt 2024, Kunming, China, December 14-16, 2024, Revised Selected Papers, Part I, Author: Dongdai Lin
Title: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques, Author: Satyanarayana Vollala
Title: Ransomware Revolution: The Rise of a Prodigious Cyber Threat, Author: Matthew Ryan
Title: Cybercomplexity: A Macroscopic View of Cybersecurity Risk, Author: Carl S. Young
Title: Internet of Things, Artificial Intelligence and Blockchain Technology, Author: R.Lakshmana Kumar
Title: Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach, Author: Stefan Rass
Title: Blockchain Cybersecurity, Trust and Privacy, Author: Kim-Kwang Raymond Choo
Title: Cyber Deception: Building the Scientific Foundation, Author: Sushil Jajodia
Title: Handbook of Big Data Privacy, Author: Kim-Kwang Raymond Choo
Title: Collaborative Approaches for Cyber Security in Cyber-Physical Systems, Author: Theo Dimitrakos
Title: Artificial Intelligence in Cyber Security: Impact and Implications: Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges, Author: Reza Montasari
Title: Information Assurance: Security in the Information Environment, Author: Andrew Blyth
Title: Handbook of Finite Fields, Author: Gary L. Mullen
Title: The Design of Rijndael: The Advanced Encryption Standard (AES), Author: Joan Daemen
Title: Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats, Author: Reza Montasari
Title: Cyber Threat Intelligence, Author: Ali Dehghantanha
Title: Critical Infrastructure Protection XVI: 16th IFIP WG 11.10 International Conference, ICCIP 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers, Author: Jason Staggs

Pagination Links