10 books • 3 series
Malicious Attack Propagation and Source Identification (Advances in Information Security, #73)
Location Privacy in Mobile Applications (SpringerBriefs on Cyber Security Systems and Networks)
Automated Design of Analog and High-frequency Circuits (Studies in Computational Intelligence, #501)