10 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Yu, Shui (Computer scientist)
Showing
1
-
10
of
10
for search:
'Yu, Shui (Computer scientist)'
, query time: 0.10s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Distributed denial of service attack and defense
by
Yu
,
Shui
(
Computer
scientist
)
Published: Springer, 2014
Description: 1 online resource (x, 97 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Security and privacy in federated learning
by
Yu
,
Shui
(
Computer
scientist
)
Published: Springer, 2023
Description: 1 online resource (170 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Intelligent industrial internet systems : architecture, deployment and applications
by
Dou, Wanchun.
Published: Springer, 2023
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Delay tolerant networks
by
Gao, Longxiang,
Published: Springer, 2015
Description: 1 online resource : color illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Big data concepts, theories, and applications
Published: Springer, 2016
Description: 1 online resource (viii, 437 pages) : illustrations (some color)
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Personalized privacy protection in big data
by
Qu, Youyang,
Published: Springer, 2021
Description: 1 online resource (xi, 139 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Privacy preservation in IoT : machine learning approaches : a comprehensive survey and use cases
by
Qu, Youyang,
Published: Springer, 2022
Description: 1 online resource : illustrations (chiefly color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Tools for design, implementation and verification of emerging information technologies : 17th EAI International Conference, TridentCom 2022, Melbourne, Australia, November 23-25, 2...
Published: Springer, 2023
Description: 1 online resource (x, 169 pages) : illustrations (chiefly color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
Machine learning empowered intelligent data center networking : evolution, challenges and opportunities
by
Wang, Ting,
Published: Springer, 2022
Description: 1 online resource : illustrations (black and white, and color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
10
Security and privacy in digital economy : first international conference, SPDE 2020, Quzhou, China, October 30-November 1, 2020, Proceedings
Published: Springer, 2020
Description: 1 online resource (756 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer networks
Computer security
Computer networks Security measures
Data privacy
Machine learning
Artificial intelligence
Big data
Big data Security measures
Computer networks Access control
Computer networks Reliability
Computer software Reusability
Computer system failures
Data encryption (Computer science)
Data protection
Denial of service attacks
Fault-tolerant computing
Intelligent control systems
Internet of things Security measures
Manufacturing processes Automation
Routing (Computer network management)
×
Loading...