 
                This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد 
                This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد 
                The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
اقرأ المزيد 
                The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
اقرأ المزيد 
                The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
اقرأ المزيد 
                The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
اقرأ المزيد 
                Explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...
اقرأ المزيد 
                Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
اقرأ المزيد 
                The development of cryogenic devices for particle detection has reached a stage at which many interesting applications are ...
اقرأ المزيدThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
اقرأ المزيد 
                The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
اقرأ المزيد 
                Provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...
اقرأ المزيدDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
اقرأ المزيدThe rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...
اقرأ المزيد 
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد 
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد 
                This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد 
                This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدTo solve the problem of congestion in bus stops for students, members of the administrative and educational people at the ...
اقرأ المزيد