Primality Testing and Integer Factorization in Public-Key Cryptography Other Books in This Series

Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023
Artificial Intelligence for Cybersecurity Artificial Intelligence for Cybersecurity
2022
Cyber Threat Intelligence Cyber Threat Intelligence
2018
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
2015
Spyware and Adware Spyware and Adware
2010
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024