This book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
اقرأ المزيدAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
اقرأ المزيدthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
اقرأ المزيدData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيدThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
اقرأ المزيدBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
اقرأ المزيدExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
اقرأ المزيدThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
اقرأ المزيدThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
اقرأ المزيدSecurity for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...
اقرأ المزيدThis book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed ...
اقرأ المزيدIn the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
اقرأ المزيدThis was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
اقرأ المزيدThis volume of selected papers is A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public ...
اقرأ المزيدThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
اقرأ المزيدInformation systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
اقرأ المزيدSemantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...
اقرأ المزيدThe book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
اقرأ المزيدThis book cover topics such as: web semantics and linked (open) data; machine learning and deep learning techniques; semantic ...
اقرأ المزيد