|
21.
|
Enhancing network performance and security of limited-resource cyber-physical networks over railway systems and other emerging systems
by Novia Nurain.
Publisher: Dhaka Department of Computer Science and Engineering, BUET 2019Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/NOV/2019] (1).
|
|
22.
|
Developing and managing information technology risk management framework case study of a commercial bank
by Abid Hossen.
Publisher: Dhaka Department of Industrial & Production Engineering, BUET 2019Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/ABI?2019] (1).
|
|
23.
|
Advanced malware analysis
by Elisan, Christopher C.
Edition: 1st ed.Publisher: New York Mc Graw Hill 2015Availability: Items available for loan: Central Library, BUET [005.8/ELI/2015] (1).
|
|
24.
|
Data driven classification framework for cyber security breaches
by Priyanka Rani.
Publisher: Dhaka Department of Computer Science and Engineering, BUET 2021Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/PRI/2021] (1).
|
|
25.
|
Computer security and the internet Tools and jewels from malware to bitcoin
by Van Oorschot, Paul C.
Edition: 2nd ed. Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/VAN/2021] (1).
|
|
26.
|
Guide to computer network security
by Kizza, Joseph Migga.
Edition: 5th ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KIZ/2020] (1).
|
|
27.
|
Emerging topics in hardware security
by Tehranipoor, Mark.
Edition: 1st ed.Publisher: Cham Springer Nature 2021Availability: Items available for loan: Central Library, BUET [005.8/TEH/2021] (1).
|
|
28.
|
Cyber-physical systems a model-based approach
by Taha, Walid M;
Taha, Abd-Elhamid M;
Thunberg, Johan.
Edition: 1st ed.Publisher: Cham Springer 2021Availability: Items available for loan: Central Library, BUET [005.8/TAH/2021] (1).
|
|
29.
|
Fundamentals of digital forensics theory, methods. and real-life applications
by Kavrestad, Joakim.
Edition: 2nd ed.Publisher: Cham Springer Nature 2020Availability: Items available for loan: Central Library, BUET [005.8/KAV/2020] (1).
|
|
30.
|
Hybrid model for cyberbullying detection from Bangla text in social media
by Sultana Umme Habiba.
Publisher: Dhaka Department of Computer Science and Engineering, BUET 2023Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/SUL/2023] (1).
|
|
31.
|
What’s on your mind? - mental health disorder risk detection from bangla social media text using weighted ensemble of transformers
by Farzana Tasnim.
Publisher: Dhaka Department of Computer Science and Engineering, BUET 2024Online Access: Click here to access online Availability: Items available for loan: Central Library, BUET [005.8/FAR/2024] (1).
|
|
32.
|
Advanced topic modeling approach to identify mental health insights of Bangladeshi university students from social media data
by Rifat Rahman.
Publisher: Dhaka Department of Computer Science and Engineering, BUET 2024Availability: Items available for loan: Central Library, BUET [005.8/RIF/2024] (1).
|
|
33.
|
Cyber Physical Systems : From Theory to Practice
by Rawat, Danda B;
Rodrigues, Joel J.P.C;
Stojmenovic, Ivan.
Edition: 1st ed.Publisher: Boca Raton Taylor and Francis 2016Availability: Items available for loan: Central Library, BUET [621.382] (1).
|