This book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...
اقرأ المزيد
This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
اقرأ المزيد
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
اقرأ المزيد
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
اقرأ المزيد
Topics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...
اقرأ المزيد
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
اقرأ المزيد
This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
اقرأ المزيد
This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
اقرأ المزيد
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 13th International Working Conference on Requirements Engineering: ...
اقرأ المزيد
Proceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...
اقرأ المزيد
The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
اقرأ المزيد
Cities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...
اقرأ المزيد
Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
اقرأ المزيد
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
اقرأ المزيد
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
اقرأ المزيد
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
اقرأ المزيد
This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
اقرأ المزيد
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيد