The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيدConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيدThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيدISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
اقرأ المزيدThis book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...
اقرأ المزيدIt is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
اقرأ المزيدThis book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
اقرأ المزيدIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
اقرأ المزيدThe ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights ...
اقرأ المزيدThis book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), ...
اقرأ المزيدProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
اقرأ المزيدSٍheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion ...
اقرأ المزيدIn IoT-Enabled Smart Healthcare Systems, Services and Applications, an accomplished team of researchers delivers an insightful ...
اقرأ المزيدCovers the multidimensional perspective of machine learning through the perspective of cloud computing and Internet of Things ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
اقرأ المزيدThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيد