Your search returned 33 results. Subscribe to this search

|
21. Enhancing network performance and security of limited-resource cyber-physical networks over railway systems and other emerging systems

by Novia Nurain.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2019Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/NOV/2019] (1).

22. Developing and managing information technology risk management framework case study of a commercial bank

by Abid Hossen.

Publisher: Dhaka Department of Industrial & Production Engineering, BUET 2019Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/ABI?2019] (1).

23. Advanced malware analysis

by Elisan, Christopher C.

Edition: 1st ed.Publisher: New York Mc Graw Hill 2015Availability: Items available for loan: Central Library, BUET [005.8/ELI/2015] (1).

24. Data driven classification framework for cyber security breaches

by Priyanka Rani.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2021Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/PRI/2021] (1).

25. Computer security and the internet Tools and jewels from malware to bitcoin

by Van Oorschot, Paul C.

Edition: 2nd ed. Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/VAN/2021] (1).

26. Guide to computer network security

by Kizza, Joseph Migga.

Edition: 5th ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KIZ/2020] (1).

27. Emerging topics in hardware security

by Tehranipoor, Mark.

Edition: 1st ed.Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/TEH/2021] (1).

28. Cyber-physical systems a model-based approach

by Taha, Walid M; Taha, Abd-Elhamid M; Thunberg, Johan.

Edition: 1st ed.Publisher: Cham Springer 2021Availability: Items available for loan: Central Library, BUET [005.8/TAH/2021] (1).

29. Fundamentals of digital forensics theory, methods. and real-life applications

by Kavrestad, Joakim.

Edition: 2nd ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KAV/2020] (1).

30. Hybrid model for cyberbullying detection from Bangla text in social media

by Sultana Umme Habiba.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2023Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/SUL/2023] (1).

31. What’s on your mind? - mental health disorder risk detection from bangla social media text using weighted ensemble of transformers

by Farzana Tasnim.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2024Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/FAR/2024] (1).

32. Advanced topic modeling approach to identify mental health insights of Bangladeshi university students from social media data

by Rifat Rahman.

Publisher: Dhaka Department of Computer Science and Engineering, BUET 2024Availability: Items available for loan: Central Library, BUET [005.8/RIF/2024] (1).

33. Cyber Physical Systems : From Theory to Practice

by Rawat, Danda B; Rodrigues, Joel J.P.C; Stojmenovic, Ivan.

Edition: 1st ed.Publisher: Boca Raton Taylor and Francis 2016Availability: Items available for loan: Central Library, BUET [621.382] (1).