It looks like you're offline.
Open Library logo
additional options menu
Last edited by Mek
October 19, 2016 | History

Willy Susilo

We need a photo of Willy Susilo

11 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Provable Security: 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information Security and Privacy: 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-20, 2020, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyber Security Meets Machine Learning

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Introduction to Security Reduction

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Internet of Things and Machine Learning for Type I and Type II Diabetes: Use Cases

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information Security Practice and Experience: 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Information and Communication Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Provable Security
            
                Lecture Notes in Computer Science  Security and Cryptology

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Advances in Cyber Security: Principles, Techniques, and Applications

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
October 19, 2016 Created by Mek Added new book.