Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيدExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
اقرأ المزيدThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
اقرأ المزيدThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
اقرأ المزيدT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
اقرأ المزيدThe book will present a variety of on-going efforts to provide new results and solutions to the problem of service productivity. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science ...
اقرأ المزيدPresents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, ...
اقرأ المزيدSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...
اقرأ المزيدProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
اقرأ المزيدThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
اقرأ المزيدIn our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, ...
اقرأ المزيدThis book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...
اقرأ المزيدPulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...
اقرأ المزيدThis book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
اقرأ المزيدIn 1965 Lotfi Zadeh, a professor of electrical engineering at the University of California in Berkeley, published the first ...
اقرأ المزيدThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...
اقرأ المزيدevaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...
اقرأ المزيدInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
اقرأ المزيدYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد