221
Published 2022
Springer International Publishing
Table of Contents: ... Curves for a 128-bit Security Level -- SecMT – Security in Mobile Technologies -- Leaky Blinders...

222
Published 2023
Springer Nature Switzerland
Table of Contents: ...Advancing Federated Edge Computing with Continual Learning for Secure and Effcient Performance -- A...

223
Published 2024
Springer Nature Switzerland
Table of Contents: ... and Application to SDitH. SiMLA – Security in Machine Learning and its Applications: One Class to Test Them All...

224
Published 2024
Springer Nature Switzerland
Table of Contents: ...AIBlock – Application Intelligence and Blockchain Security: An End-to-End Secure Solution for IoMT...

225
by Abaimov, Stanislav, Martellini, Maurizio
Published 2022
Springer International Publishing
Subjects: ...Computer networks / Security measures...

227
Published 2022
Springer Nature Singapore
Table of Contents: ... honeypot approach -- Chapter 3. Analysis of Risk and Security within Fog Computing enabled e-Healthcare...

228
by Rawal, Bharat S., Manogaran, Gunasekaran, Peter, Alexender
Published 2023
Springer Nature Singapore
Table of Contents: ... -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography...

229
Published 2020
Springer International Publishing
Table of Contents: ... for a Datafow Architecture -- SecureMCMR: Computation Outsourcing for MapReduce Applications -- Evasion...

230
Published 2020
Springer Nature Singapore
Subjects: ...Computer networks / Security measures...

231
by Ren, Kui, Wang, Cong
Published 2023
Springer International Publishing
Table of Contents: ... Semantics -- Recent Advancements on Functionality and Performance -- Security Impact of Leakage Profiles...

232
by Thiel, David
Published 2016
No Starch Press
Table of Contents: ... This Book Is Structured ; Conventions This Book Follows ; A Note on Swift ; Mobile Security Promises...

233
by Willems, Eddy
Published 2019
Springer International Publishing
Subjects: ...Computer networks / Security measures...

234
Published 2022
Springer International Publishing
Table of Contents: ...1. Big data analytics and forensics: an overview -- 2. Lot privacy, security and forensics...

235
by Krutz, Ronald L.
Published 2010
Wiley Pub.
Table of Contents: ...CLOUD SECURITY: A Comprenhensive Guide to Secure Cloud Computing; Contents at a Glance; About...

236
Published 2022
Springer International Publishing
Subjects: ...Computer networks / Security measures...

237
Published 2024
Springer Nature Singapore
Table of Contents: ... based Electronic Health Record (EHR) system for Secure Data Storage -- SVM-RF: A hybrid machine learning...

238
Published 2024
Springer Nature Singapore
Subjects: ...Computer networks / Security measures...

239
Published 2023
Springer Nature Switzerland
Table of Contents: ...ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet -- Zero Update...

240
Published 2022
Springer International Publishing
Table of Contents: ... Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP...