This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيدThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيدThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
اقرأ المزيدDecoupling or non-interactive control has attracted considerable research attention since the 1960s when control engineers ...
اقرأ المزيدExamines and demonstrates state-of-the-art approaches for IoT and Machine Learning based biomedical and health related applications. ...
اقرأ المزيدThis second edition includes an entirely new chapter on holographic message plaques for future interstellar probes – a ...
اقرأ المزيدIt uses the advance core (the core of ground ahead of the face) as a structural tool for the long and short term stabilisation ...
اقرأ المزيدDesign and Performance of 3G Wireless Networks and Wireless LANs is for wireless communication system engineers, network ...
اقرأ المزيدSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدA practical tool for dentists and dental hygienists providing oral health care to patients with diabetes mellitus. Firmly ...
اقرأ المزيدThe book presents effective model-based analysis and design methods for fault diagnosis and fault-tolerant control. Architectural ...
اقرأ المزيدIn this book, Higher Order Statistical (HOS) theory is used to develop indices for detecting and quantifying signal non-Gaussianity ...
اقرأ المزيدDifferential equations are a fast evolving branch of mathematics and one of the mathematical tools most used by scientists ...
اقرأ المزيدThis book focuses on the fields of fuzzy logic, bio-inspired algorithm, especially the differential evolution algorithm and ...
اقرأ المزيد