This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
Limit/Sort Search
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Add Marked to Bag
Add All On Page
Add Marked to My Lists
Authors (Last name first) (1-20 of 20)
Wang, Cliff.
1
2020
Adaptive autonomous secure cyber systems
Rating:
Electronic Resources
More...
2
2019
Adversarial and uncertain reasoning for adaptive cyber defense : control- and game-theoretic approaches to cyber security
Cham : Springer, [2019]
Rating:
Electronic Resources
More...
3
2023
AI embedded assurance for cyber systems
Cham : Springer, [2023]
Rating:
Electronic Resources
4
2019
Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings
Al-Shaer, Ehab S., 1967- author.
Cham, Switzerland : Springer, 2019
Rating:
Electronic Resources
More...
5
2007
Botnet detection : countering the largest security threat
New York ; London : Springer, 2007
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
005.8 Lee/Bdc
AVAILABLE
6
2007
Botnet detection : countering the largest security threat
Rating:
Electronic Resources
More...
7
2016
Cyber deception : building the scientific foundation
Cham : Springer, 2016
Rating:
Electronic Resources
More...
8
2022
Cyber deception techniques, strategies, and human aspects
Rating:
Electronic Resources
9
2014
Cyber defense and situational awareness
Cham : Springer, 2014
Rating:
Electronic Resources
More...
10
2015
Cyber warfare : building the scientific foundation
Cham : Springer, 2015
Rating:
Electronic Resources
More...
11
2016
Digital fingerprinting
New York : Springer, [2016]
Rating:
Electronic Resources
More...
12
2014
Fundamentals of sketch-based passwords : a general framework
Riggan, Benjamin S., author
Heidelberg : Springer, 2014
Rating:
Electronic Resources
More...
13
2007
Information security research : new methods for protecting against cyber threats
Indianapolis, Ind. ; [Chichester] : Wiley, [2007]
Rating:
Request It
Location
Call no.
Vol.
Availability
MELB
005.8 Wan/Isr
AVAILABLE
W'PONDS
005.8 Wan/Isr
AVAILABLE
14
2012
Introduction to hardware security and trust
Rating:
Electronic Resources
More...
15
2015
Modeling and evaluating denial of service attacks for wireless and mobile applications
Lu, Zhuo, author
Cham : Springer, 2015
Rating:
Electronic Resources
More...
16
2019
Proactive and dynamic network defense
Cham, Switzerland : Springer, [2019]
Rating:
Electronic Resources
More...
17
2014
Secure cloud computing
New York : Springer Science and Business Media, [2014]
Rating:
Electronic Resources
More...
18
2006
Secure localization and time synchronization for wireless sensor and ad hoc networks
Poovendran, Radha.
New York : Springer, 2006
Rating:
Request It
Location
Call no.
Vol.
Availability
W'PONDS
681.25 Poo/Sla
AVAILABLE
19
2006
Secure localization and time synchronization for wireless sensor and ad hoc networks
Poovendran, Radha
Rating:
Electronic Resources
More...
20
2017
Theory and models for cyber situation awareness
Cham, Switzerland : Springer, 2017
Rating:
Electronic Resources
Add Marked to Bag
Add All On Page
Locate in results
Return to Browse
Limit/Sort Search