Showing 1 - 20
of 98
for search: '',
query time: 0.11s
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.Narrow Search
Remove Filters
Call Number: Q - Science
Literary Form: Non fiction
Subject: Computer security
Subject: Artificial intelligence
Institution
Collection
Format
Subject
Artificial intelligence
Computer security
13
Data protection
11
Big data
10
Data encryption (Computer science)
9
Cloud computing Security measures
more ...
8
Computer networks Security measures
8
Computer science
7
Computer networks
7
Machine learning
6
Data mining
5
Computational intelligence
5
Computers
5
Internet of things
5
Software engineering
4
Blockchains (Databases)
4
Computer crimes
3
Intelligent agents (Computer software)
2
Artificial intelligence Mathematical models
2
Biometric identification
2
Computer logic
2
Computer networks Access control
2
Computer organization
2
Database security
2
Digital forensic science
2
Electronic data processing
2
Formal languages
2
Logic, Symbolic and mathematical
2
Optical data processing
1
Application software Security measures
see all ...
less ...
Author
74
SpringerLink (Online service)
24
SpringerLink (Online Service)
12
ICAIS (Conference)
7
Bertino, Elisa,
7
Sun, Xingming,
7
Zhang, Xiaorui,
more ...
5
Bertino, Elisa
5
Euro-China Conference on Intelligent Data Analysis and Applications
5
ICAIS (Conference) Dublin, Ireland)
5
Sun, Xingming
5
Xia, Zhihua
4
Alazab, Mamoun, 1980-
4
ICAIS (Conference) Hohhot, China)
4
Pan, Jeng-Shyang,
4
Wang, Jinwei (Computer scientist)
3
Choo, Kim-Kwang Raymond,
3
ICAIS (Conference) Qinghai Sheng, China) Qinghai, China)
3
International Conference on Data Science for Computational Security
3
International Conference on Data Science for Computational Security Pune, India)
3
International Conference on Emerging Trends and Technologies on Intelligent Systems
3
International Conference on Security with Intelligent Computing and Big-data Services
3
Maleh, Yassine, 1987-
3
Pejaś, Jerzy, 1954-
3
Snášel, Václav, 1957-
3
Torra, Vicenç
3
Xia, Zhihua,
2
Abawajy, Jemal H., 1982-
2
Baddi, Youssef,
2
Euro-China Conference on Intelligent Data Analysis and Applications Shenzhen, China)
2
International Conference on Applications and Techniques in Cyber Security and Intelligence
see all ...
less ...
Language
Literary Form
Call Number
Year of Publication