6 books • 5 series
Adversarial Machine Learning
Malicious Attack Propagation and Source Identification (Advances in Information Security, #73)
Location Privacy in Mobile Applications (SpringerBriefs on Cyber Security Systems and Networks)
Differential Privacy and Applications (Advances in Information Security, #69)
Delay Tolerant Networks (SpringerBriefs in Computer Science)
Distributed Network Systems (Network Theory and Applications, #15) (NATO Asi, #41)