|
Malicious Attack Propagation and Source Identification (Advances in Information Security, 73)
by
it was amazing 5.00 avg rating — 1 rating
—
2 editions
|
|
|
Distributed Denial of Service Attack and Defense
by
really liked it 4.00 avg rating — 1 rating
—
published
2013
—
4 editions
|
|
|
Networking for Big Data (Chapman & Hall/CRC Big Data Series Book 2)
by
really liked it 4.00 avg rating — 1 rating
—
published
2015
—
5 editions
|
|
|
Big Data Concepts, Theories, and Applications
by
really liked it 4.00 avg rating — 1 rating
—
6 editions
|
|
|
Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings
by
|
|
|
Security and Privacy in Federated Learning
by
|
|
|
Tools for Design, Implementation and Verification of Emerging Information Technologies: 17th EAI International Conference, TridentCom 2022, Melbourne, ... and Telecommunications Engineering, 489)
by
0.00 avg rating — 0 ratings
|
|
|
Tools for Design, Implementation and Verification of Emerging Information Technologies: 17th EAI International Conference, TridentCom 2022, Melbourne, ... Telecommunications Engineering Book 489)
by
0.00 avg rating — 0 ratings
|
|
|
Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings ... Computer and Information Science Book 1268)
by
0.00 avg rating — 0 ratings
|
|
|
Tools for Design, Implementation and Verification of Emerging Information Technologies: 17th EAI International Conference, TridentCom 2022, Melbourne, ... Telecommunications Engineering Book 489)
by
0.00 avg rating — 0 ratings
|
|
|
Personalized Privacy Protection in Big Data
by
|
|
|
Machine Learning Empowered Intelligent Data Center Networking: Evolution, Challenges and Opportunities
by
0.00 avg rating — 0 ratings
|
|
|
Privacy Preservation in IoT: Machine Learning Approaches: A Comprehensive Survey and Use Cases
by
0.00 avg rating — 0 ratings
|
|
|
Malicious Attack Propagation and Source Identification (Advances in Information Security Book 73)
by
0.00 avg rating — 0 ratings
|
|
|
Intelligent Industrial Internet Systems: Architecture, Deployment and Applications
by
|
|
|
Privacy Preservation in IoT: Machine Learning Approaches: A Comprehensive Survey and Use Cases
by
|
|
|
Delay Tolerant Networks
by
0.00 avg rating — 0 ratings
—
published
2015
—
2 editions
|
|
|
Machine Learning Empowered Intelligent Data Center Networking: Evolution, Challenges and Opportunities
by
|
|
|
Personalized Privacy Protection in Big Data
by
|
|
|
Delay Tolerant Networks
by
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.