Books on the topic 'Mathematical data- Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Mathematical data- Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Kopczuk, Wojciech. Uncovering the American dream: Inequality and mobility in social security earnings data since 1937. Cambridge, Mass: National Bureau of Economic Research, 2007.
Find full textKopczuk, Wojciech. Uncovering the american dream: Inequality and mobility in social security earnings data since 1937. Cambridge, MA: National Bureau of Economic Research, 2007.
Find full textÖzyer, Tansel. Mining Social Networks and Security Informatics. Dordrecht: Springer Netherlands, 2013.
Find full textBrand, Ruth. Anonymität von Betriebsdaten: Verfahren zur Erfassung und Massnahmen zur Verringerung des Reidentifikationsrisikos. Nürnberg: Institut für Arbeitsmarkt- und Berufsforschung der Bundesanstalt für Arbeit, 2000.
Find full textIgor, Kotenko, and Skormin Victor A. 1946-, eds. Computer network security: 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings. Heidelberg: Springer, 2012.
Find full textDiergardt, Martin. Modeling scenarios for analyzing the risks of complex computer based information systems. Berlin: dissertation.de, 2007.
Find full textKott, Alexander. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Boston, MA: Springer Science+Business Media, LLC, 2010.
Find full textTorra, Vicenç. Modeling Decisions for Artificial Intelligence: 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textAggarwal, Charu C. Outlier Analysis. New York, NY: Springer New York, 2013.
Find full textAmy, Felty, and SpringerLink (Online service), eds. Interactive Theorem Proving: Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textJhala, Ranjit. Programming Languages and Systems: 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textV, Dasarathy Belur, and Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2007.
Find full textMusaji, Yusufali F. Auditing and security: AS/400, NT, Unix, networks, and disaster recovery plans. New York: John Wiley & Sons, 2001.
Find full textSakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. Chichester, West Sussex: John Wiley & Sons Inc., 2015.
Find full textYanlin, Qin, ed. Xin xi an quan shu xue ji chu. Beijing Shi: Guo fang gong ye chu ban she, 2009.
Find full textDamgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Berlin: Springer-Verlag Berlin Heidelberg, 1999.
Find full textGrigor'ev, Anatoliy, Evgeniy Isaev, and Pavel Tarasov. Transfer, storage and processing of large volumes of scientific data. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1073525.
Full text1945-, Clark Andrew, and Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.
Find full textBashkatov, Aleksandr. Simulation of accidents on route transport. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860140.
Full textHanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textRokne, Jon, Tansel Özyer, and Zeki Erdem. Mining Social Networks and Security Informatics. Springer, 2013.
Find full textRokne, Jon, Tansel Özyer, Zeki Erdem, and Suheil Khoury. Mining Social Networks and Security Informatics. Springer, 2013.
Find full textRokne, Jon, Tansel Özyer, Zeki Erdem, and Suheil Khoury. Mining Social Networks and Security Informatics. Springer, 2014.
Find full text(Editor), Ashley Morris, and Svitlana Kokhan (Editor), eds. Geographic Uncertainty in Environmental Security (NATO Science for Peace and Security Series C: Environmental Security). Springer, 2007.
Find full textKott, Alexander, and Gary Citrenbaum. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2010.
Find full textZhu, Hong, and Clive Blackwell. Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2014.
Find full textCyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2016.
Find full textCyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2014.
Find full textKott, Alexander, and Gary Citrenbaum. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2014.
Find full textTakagi, Tsuyoshi. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Nature, 2021.
Find full textTakagi, Tsuyoshi, Noboru Kunihiro, Masato Wakayama, Keisuke Tanaka, and Kazufumi Kimoto. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Singapore Pte. Limited, 2020.
Find full textTakagi, Tsuyoshi, Noboru Kunihiro, Masato Wakayama, Keisuke Tanaka, and Kazufumi Kimoto. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Singapore Pte. Limited, 2021.
Find full textInformation Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Find full textScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Find full textTorra, Vicenç, Yasuo Narukawa, Aoi Honda, and Sozo Inoue. Modeling Decisions for Artificial Intelligence: 14th International Conference, MDAI 2017, Kitakyushu, Japan, October 18-20, 2017, Proceedings. Springer, 2017.
Find full textTorra, Vicenç, Yasuo Narukawa, Gabriella Pasi, and Marco Viviani. Modeling Decisions for Artificial Intelligence: 16th International Conference, MDAI 2019, Milan, Italy, September 4–6, 2019, Proceedings. Springer, 2019.
Find full textTorra, Vicenç, and Torra Narukawa. Modeling Decisions for Artificial Intelligence: 12th International Conference, MDAI 2015, Skövde, Sweden, September 21-23, 2015, Proceedings. Springer, 2015.
Find full textTorra, Vicenç, and Yasuo Narukawa. Modeling Decisions for Artificial Intelligence: 19th International Conference, MDAI 2022, Sant Cugat, Spain, August 30-September 2, 2022, Proceedings. Springer International Publishing AG, 2022.
Find full textTorra, Vicenç, Yasuo Narukawa, Isabel Aguiló, and Manuel González-Hidalgo. Modeling Decisions for Artificial Intelligence: 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedings. Springer, 2018.
Find full textTorra, Vicenç, Yasuo Narukawa, and Yasunori Endo. Modeling Decisions for Artificial Intelligence: 11th International Conference, MDAI 2014, Tokyo, Japan, October 29-31, 2014, Proceedings. Springer, 2014.
Find full textAgell, Núria, Vicenç Torra, Yasuo Narukawa, and Jordi Nin. Modeling Decisions for Artificial Intelligence: 17th International Conference, MDAI 2020, Sant Cugat, Spain, September 2-4, 2020, Proceedings. Springer International Publishing AG, 2020.
Find full textTorra, Vicenç, and Yasuo Narukawa. Modeling Decisions for Artificial Intelligence: 18th International Conference, MDAI 2021, Umeå, Sweden, September 27-30, 2021, Proceedings. Springer International Publishing AG, 2021.
Find full textTorra, Vicenç, Yasuo Narukawa, Guillermo Navarro-Arribas, and Cristina Yañez. Modeling Decisions for Artificial Intelligence: 13th International Conference, MDAI 2016, Sant Julià de Lòria, Andorra, September 19-21, 2016. Proceedings. Springer, 2016.
Find full textTorra, Vicenç, Yasuo Narukawa, and Yasunori Endo. Modeling Decisions for Artificial Intelligence: 11th International Conference, MDAI 2014, Tokyo, Japan, October 29-31, 2014, Proceedings. Springer, 2014.
Find full textAlazab, Mamoun, and Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Find full textAlazab, Mamoun, and Maanak Gupta. Trust, Security and Privacy for Big Data. Taylor & Francis Group, 2022.
Find full textAlazab, Mamoun, and Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Find full textAlazab, Mamoun, and Maanak Gupta. Trust, Security and Privacy for Big Data. Taylor & Francis Group, 2022.
Find full textAlazab, Mamoun, and Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Find full textOutlier Analysis. Springer, 2017.
Find full text