Advanced Search

  • SEARCHING...
  • SEARCHING...

Result Search
Found 11 from your keywords: Subject : "Cybersecurity"
Query took 1.28872 second(s) to complete


 1   2   Next   Last Page 

Quantum Cryptography in Advanced Networks

Author(s) : Morozov, Oleg -
Call Number :
Availability : none copy available

Proceedings of 2nd International Conference on Smart Computing and Cyber Security

Author(s) : Pattnaik, Prasant Kumar - Sain, Mangal - Al-Absi, Ahmed A. -
Call Number : 005.8 PAT p
Availability : 1 copies available for loan

Cybersecurity, Vol. 8, 2025

Author(s) : Zhang, Jie - Yanjun Li - Zhang, Jiachen - Qiuxiang Li - Zhang, Han - Huang, Ruiqi - Wang, Ri - Wang, Huanwei - Yan, Lianglin - Zheng, Jian - Zhou, Hongfang - Yang, Yaqi - Lin Wu - Kerl, Malte - Guangli Wu -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 7, 2024

Author(s) : Wang, Wenbo - Shen, Qintao - Wang, Huizhuo - Pan, Yao - Tian, Miao - Wei, Benqiang - Chuah, Edward - Yan, Chuyi - Lai, Tin - Sun, Zheng - Wang, Chaoqun - Wang, Huaxin - Zhu, Zeshuo - Luo, Yuantu - Wang, Ruida -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 6, 2023

Author(s) : Jianfu Huang - Huashuang Yang - Chuyi Yan - Mir Nazish - Fei Tang - Vaishnavi Sivagaminathan - Qi Zhang - Anit Kumar Ghosal - Sea Ran Cleon Liew - Chang Liu - B S Sharmila - Yu Wei - Jean De La Croix Ntivuguruzwa - Armita Kazeminajafabadi - Feng Guo - Kaisheng Fan -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 5, 2022

Author(s) : Ruipeng Yang - Feng Wang - Weiwei Zhang - Haiyan Xiao - Anjaneya Awasthi - Yu Zhang - Vishnu Renganathan - Kun Jia - Zhijian Liao - Zhaoshan Fan - Jenny Heino - Max Eisele - Ji Shi - Gatha Varma - Masoud Mehrabi Koushki - Lei Bi - Ruishi Li -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 4, 2021

Author(s) : Jiang, Jianguo - Khraisat, Ansam - Liang, Ruigang - Ullah, Shafi - Rahman, Md. Shafiur - Palleti, Venkata Reddy - Shafarenko, Alex - Gao, Runchen - Liu, Wenbo - Anaadumba, Raphael -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 3, 2020

Author(s) : Lahcen, Rachid Ait Maalem - Hui Xu - Skopik, Florian - Albladi, Samar Muslah - Ren, Fangli - Gao, Yiwen - Schwarz, Michael - Sudhakar -
Call Number :
Availability : none copy available

Cybersecurity, Vol. 2, 2019

Author(s) : Chen, Tong - Alallaq, Noora - Wan, Shengye - Kumar, Naveen - Chen, Qingfeng - Morisset, Charles - Chaoqun Ma - Colombo, Pietro - Alohaly, Manar - Wang, Xiayang -
Call Number :
Availability : none copy available

Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

Author(s) : Johnson, Thomas A. -
Call Number :
Availability : none copy available
 1   2   Next   Last Page