Risultati della ricerca
-
1
The law and economics of cybersecurity edited by Mark F. Grady, Francesco Parisi.
Pubblicazione 2006Libro -
2
-
3
Biologically Inspired Cognitive architectures (BICA) for young scientists proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity...
Pubblicazione 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
4
Intelligent data analysis for e-Learning enhancing security and trustworthiness in online learning systems
Pubblicazione 2017Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
5
-
6
International Conference on Applications and Techniques in Cyber Security and Intelligence applications and techniques in cyber security and intelligence
Pubblicazione 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
7
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications
Pubblicazione 2018Available for University of the Philippines System via SpringerLink. Click here to access
Also available remotely for University of the Philippines System via SpringerLink. Click here to access thru EZproxy
Electronic Resource -
8
Hardware security design, threats, and safeguards
Pubblicazione 2015Available for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access
Also available remotely for University of the Philippines Diliman College of Engineering via CRCnetBASE. Click here to access thru EZproxy
Electronic Resource -
9
The art of software security assessment identifying and preventing software vulnerabilities
Pubblicazione 2007Libro -
10