Search

Your search keyword '"Buchanan, William J."' showing total 28 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J." Topic cyber-security Remove constraint Topic: cyber-security
28 results on '"Buchanan, William J."'

Search Results

1. NapierOne: A modern mixed file data set alternative to Govdocs1

2. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

3. Machine learning and semantic analysis of in-game chat for cyber bullying

4. 'I am Spartacus' – privacy enhancing technologies and privacy as a public good

5. Minimising collateral damage: privacy-preserving Investigative data acquisition platform

6. Crime risk evaluation within information sharing between the Police and community partners

7. How academic IT departments manage changing IT environments

8. Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs

9. AES Encryption and Decryption in Microsoft .NET

10. Analysis of Information governance and patient data protection within primary health care

11. 3DES Encryption and Decryption in Microsoft .NET

12. Mass customisation through personalised brochures: the role of digital printing

13. Uzytkowanie Komputerow

14. Handbook of data communications and networks

15. The complete handbook of the Internet

16. Distributed systems and networks

17. Advanced PC interfacing, communications and Windows programming

18. Wiedziec wiecej Internet

19. Advanced data communications and networks

20. Prediction of electric fields from conductors on a PCB by 3D finite-difference time-domain method

21. Prediction of electric fields in and around PCBs - 3D Finite-Difference Time-Domain approach with parallel processing

22. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

23. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

24. RC2 Encryption and Decryption in Microsoft .NET

25. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

26. Embedded document security using sticky policies and identity based encryption

27. RESCUE : evaluation of a fragmented secret share system in distributed-cloud architecture

28. An agent-based Bayesian method for network intrusion detection

Catalog

Books, media, physical & digital resources