This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...
اقرأ المزيد
This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...
اقرأ المزيد
This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...
اقرأ المزيد
This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...
اقرأ المزيد
The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
اقرأ المزيد
This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...
اقرأ المزيد
This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...
اقرأ المزيد
This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيد
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...
اقرأ المزيد
This book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...
اقرأ المزيد
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيد
Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيد