Logo Oapen
  • Join
    • Deposit
    • For Librarians
    • For Publishers
    • For Researchers
    • Funders
    • Resources
    • OAPEN
        Publications 
        •   OAPEN Home
        • 20.500.12657/47869
        • Publications
        •   OAPEN Home
        • 20.500.12657/47869
        • Publications
        JavaScript is disabled for your browser. Some features of this site may not work without it.

        Publications

        Now showing items 1-10 of 20

        • Results Per Page:
        • 5
        • 10
        • 20
        • 40
        • 60
        • 80
        • 100
        • Help
        • Results Per Page:
        • 5
        • 10
        • 20
        • 40
        • 60
        • 80
        • 100
        Thumbnail

        Convex Optimization for Machine Learning 

        Suh, Changho (2022)
        This book covers an introduction to convex optimization, one of the powerful and tractable optimization problems that can be efficiently solved on a computer. The goal of the book is to help develop a sense of what convex ...
        Thumbnail

        Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation 

        Sargsyan, Gohar; Kavallieros, Dimitrios; Kolokotronis, Nicholas (2022)
        The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development ...
        Thumbnail

        Statistical Analysis of Networks 

        Avrachenkov, Konstantin; Dreveton, Maximilien (2022)
        This book is a general introduction to the statistical analysis of networks, and can serve both as a research monograph and as a textbook. Numerous fundamental tools and concepts needed for the analysis of networks are ...
        Thumbnail

        Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles 

        Guijarro, Jordi; Mhiri, Saber; CHOI, YOU-JUN (2022)
        The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the ...
        Thumbnail

        SpiNNaker - A Spiking Neural Network Architecture 

        Furber, Steve; Bogdan, Petruț (2020)
        20 years in conception and 15 in construction, the SpiNNaker project has delivered the world’s largest neuromorphic computing platform incorporating over a million ARM mobile phone processors and capable of modelling spiking ...
        Thumbnail

        Security Risk Management for the Internet of Things 

        Soldatos, John (2020)
        In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies ...
        Thumbnail

        Sparsity Methods for Systems and Control 

        Nagahara, Masaaki (2020)
        The method of sparsity has been attracting a lot of attention in the fields related not only to signal processing, machine learning, and statistics, but also systems and control. The method is known as compressed sensing, ...
        Thumbnail

        Cyber-Physical Threat Intelligence for Critical Infrastructures Security 

        Soldatos, John; Philpot, James; Giunta, Gabriele (2020)
        Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing ...
        Thumbnail

        Applied Signal Processing 

        Puthusserypady, Sadasivan (2021)
        Being an inter-disciplinary subject, Signal Processing has application in almost all scientific fields. Applied Signal Processing tries to link between the analog and digital signal processing domains. Since the digital ...
        Thumbnail

        Cyber-Physical Threat Intelligence for Critical Infrastructures Security 

        Soldatos, John; Praça, Isabel; Jovanović, Aleksandar (2021)
        Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries ...
        • 1
        • 2

        Browse

        All of OAPENSubjectsPublishersLanguagesCollections

        My Account

        LoginRegister

        Export

        Repository metadata
        Logo Oapen
        • For Librarians
        • For Publishers
        • For Researchers
        • Funders
        • Resources
        • OAPEN

        Newsletter

        • Subscribe to our newsletter
        • view our news archive

        Follow us on

        License

        • If not noted otherwise all contents are available under Attribution 4.0 International (CC BY 4.0)

        Credits

        • logo EU
        • This project received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 683680, 810640, 871069 and 964352.

        OAPEN is based in the Netherlands, with its registered office in the National Library in The Hague.

        Director: Niels Stern

        Address:
        OAPEN Foundation
        Prins Willem-Alexanderhof 5
        2595 BE The Hague
        Postal address:
        OAPEN Foundation
        P.O. Box 90407
        2509 LK The Hague

        Websites:
        OAPEN Home: www.oapen.org
        OAPEN Library: library.oapen.org
        DOAB: www.doabooks.org

         

         

        Export search results

        The export option will allow you to export the current search results of the entered query to a file. Differen formats are available for download. To export the items, click on the button corresponding with the preferred download format.

        A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

        To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

        After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.