Explore our comprehensive collection of books, articles, digital media, and more
Data Warehousing and Data Mining Techniques for Cyber Security /
Principles of data security /
Pervasive information security and privacy developments : trends and advancements /
Developing a host intrusion prevention system by using data mining \
Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Investigative data mining for security and criminal detection /
Managing information systems security and privacy /
Information security fundamentals /
Digital preservation /
Security in computing /
Data and knowledge protection in data mining \
Improving Privacy in Decentralized Identity Management Systems with Distributed Ledger Technology (blockchain) as Infrastructure /
Privacy and access to government data for research : an international bibliography /
IoT Based Solution for Tracking, Locating and Monitoring the Pilgrim's Health During Hajj /
Information security : principles and practices /
Data mining : concepts and techniques /
Introduction to Data Mining /
Knowledge-based business intelligence depends on data mining technique \
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Automatic Qurʼān Tutor to Assist Qurʼānic Recitation with Neural Network /
Supervised Learning Approach for Knowledge Extraction & Decision-Making Process usinggenome sequence in Bioinformatics /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Voice Command and Gesture Recognition using Multimodal Deep Learning /
Solving the Multiple Traveling Salesman Problem by Hybrid Genetic Algorithm /
Detecting Violence In Videos Using Movies Transcripts (Arabic Movie Or Dubbed Animations) By Using Text Mining Techniques /
Artificial Intelligence Governance in Public Sector /
Improve the Usability of Government Applications for Elderlies in the Kingdom of Saudi Arabia /
Identifying Fake Twitter Trends with Deep Learning /
Enhancing Pre-trained Arabic Language Models with Structured Knowledge /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Knowledge discovery and data mining : challenges and realities /