Linked e-resources
Details
Table of Contents
Software security
Blockchain & machine Learning
Hardware security
Attacks
Malware & vulnerabilities
Protocol security
Privacy (I)
CPS and IoT security
Mobile security
Database & web security
Cloud security
Applied crypto (I)
Privacy (II)
Multi-party computation
SDN security
Applied crypto (II).
Blockchain & machine Learning
Hardware security
Attacks
Malware & vulnerabilities
Protocol security
Privacy (I)
CPS and IoT security
Mobile security
Database & web security
Cloud security
Applied crypto (I)
Privacy (II)
Multi-party computation
SDN security
Applied crypto (II).