1131. Adaptive autonomous secure cyber systems. (2020) Other Names: Jajodia, Sushil; Cybenko, George; Subrahmanian, V. S; Swarup, Vipin; Wang, Cliff; Wellman, Michael Record Type: Book Extent: 1 online resource (x, 289 pages), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1132. Data science in cybersecurity and cyberthreat intelligence. ([2020]) Editors: Sikos, Leslie F; Choo, Kim-Kwang Raymond Record Type: Book Extent: 1 online resource (140 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1133. Fundamentals of Brooks-Iyengar distributed sensing algorithm trends, advances, and future prospects /: trends, advances, and future prospects. (2020) Other Names: Sniatala, Pawel; Amini, M. Hadi; Boroojeni, Kianoosh G, 1989- Record Type: Book Extent: 1 online resource (207 p.) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1134. Transactions on computational science XXXV : special issue on signal processing and security in distributed systems /: special issue on signal processing and security in distributed systems. (2020) Editors: Gavrilova, Marina L; Tan, C. J. Kenneth (Chih Jeng Kenneth); (Computer scientist), Saeed, Khalid; Chaki, Nabendu Record Type: Book Extent: 1 online resource (xv, 153 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1135. Trusted computing and information security : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers /: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers. (2020) Other Names: Han, Weili; Zhu, Liehuang; Yan, Fei; Chinese Conference on Trusted Computing and Information Security, 13th Record Type: Book Extent: 1 online resource (367 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1136. Information security theory and practice : 13th IFIP WG 11. 2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings /: 13th IFIP WG 11. 2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings. (2020) Other Names: Laurent-Maknavicius, Maryline; Giannetsos, Thanassis; WISTP (Conference), 13th Record Type: Book Extent: 1 online resource (254 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1137. Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings /: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. ([2020]) Editors: Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Hadj Kacem, Ahmed Other Names: International Conference on Risks and Security of Internet and Systems, 14th Record Type: Book Extent: 1 online resource (380 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1138. Innovative Security Solutions for Information Technology and Communications : 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers /: 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. (2020) Other Names: Simion, Emil; Géraud-Stewart, Rémi; International Conference on Security for Information Technology and Communications, 12th Record Type: Book Extent: 1 online resource (278 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1139. Designing a HIPAA-compliant security operations center : a guide to detecting and responding to healthcare breaches and events /: a guide to detecting and responding to healthcare breaches and events. ([2020]) Authors: Thompson, Eric C Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
1140. Binary code fingerprinting for cybersecurity : application to malicious code fingerprinting /: application to malicious code fingerprinting. (2020) Other Names: Alrabaee, Saed; Debbabi, Mourad; Shirani, Paria; Wang, Lingyu; Youssef, Amr M; Rahimian, Ashkan; Nouh, Lina; Mouheb, Djedjiga; Huang, He; Hanna, Aiman Record Type: Book Extent: 1 online resource (264 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗