The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
اقرأ المزيد
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
اقرأ المزيد
This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
اقرأ المزيد
INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
اقرأ المزيد
This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
اقرأ المزيد
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيد
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيدThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيد
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيد
This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
اقرأ المزيد
Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting ...
اقرأ المزيد
Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
اقرأ المزيد
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيد
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
اقرأ المزيد
This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
اقرأ المزيد