The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدIn recent years the question of the legitimacy of international law has been discussed quite intensively. Such questions ...
اقرأ المزيدThese proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
اقرأ المزيدThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
اقرأ المزيدThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
اقرأ المزيدcovers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...
اقرأ المزيدThis book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
اقرأ المزيدDescribes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
اقرأ المزيدThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
اقرأ المزيدThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيدThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيدThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيدThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيدMalware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
اقرأ المزيدDiscusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...
اقرأ المزيدAt the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...
اقرأ المزيدThis book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts ...
اقرأ المزيدThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
اقرأ المزيد