Advances in Information Security
Hernandez Fernandez / Omri / Di Pietro
Physical Layer Security in Power Line Communications
Physical Layer Security in Power Line Communications
Fundamentals, Models and Applications
Ruj / Kanhere / Conti
A Handbook on Fundamentals, Platforms and Applications
Boulila / Ahmad / Koubaa / Driss / Farah
Decision Making and Security Risk Management for IoT Environments
Decision Making and Security Risk Management for IoT Environments
Montasari
The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity
Möller
Guide to Cybersecurity in Digital Transformation
Guide to Cybersecurity in Digital Transformation
Trends, Methods, Technologies, Applications and Best Practices
Stamp / Aaron Visaggio / Mercaldo / Di Troia
Artificial Intelligence for Cybersecurity
Artificial Intelligence for Cybersecurity
Ruj / Kanhere / Conti
A Handbook on Fundamentals, Platforms and Applications
Kott
Autonomous Intelligent Cyber Defense Agent (AICA)
Autonomous Intelligent Cyber Defense Agent (AICA)
A Comprehensive Guide
Boulila / Ahmad / Koubaa / Driss / Farah
Decision Making and Security Risk Management for IoT Environments
Decision Making and Security Risk Management for IoT Environments
Stamp / Aaron Visaggio / Mercaldo / Di Troia
Artificial Intelligence for Cybersecurity
Artificial Intelligence for Cybersecurity
Karbab / Debbabi / Derhab
Android Malware Detection using Machine Learning
Android Malware Detection using Machine Learning
Data-Driven Fingerprinting and Threat Intelligence
Maleh / Alazab / Romdhani
Blockchain for Cybersecurity in Cyber-Physical Systems
Blockchain for Cybersecurity in Cyber-Physical Systems