Primality Testing and Integer Factorization in Public-Key Cryptography كتب أخرى بهذه السلسلة
Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures
٢٠٠٧
Autonomous Intelligent Cyber Defense Agent (AICA)
٢٠٢٣
Artificial Intelligence for Cybersecurity
٢٠٢٢
Cyber Threat Intelligence
٢٠١٨
Cyber Denial, Deception and Counter Deception
٢٠١٥
Spyware and Adware
٢٠١٠
Enabling Privacy Preserving Data Analytics
٢٠٢٥
Physical Layer Security in Power Line Communications
٢٠٢٤
Adversarial Multimedia Forensics
٢٠٢٤
Blockchains
٢٠٢٤