This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
WeiterlesenThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
WeiterlesenWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
WeiterlesenWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
WeiterlesenThis book analyzes the dynamics and impacts of software development and discusses new institutional and economic changes ...
WeiterlesenIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
WeiterlesenThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
WeiterlesenThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
WeiterlesenThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
WeiterlesenThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
WeiterlesenThis book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
WeiterlesenThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
WeiterlesenThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
WeiterlesenThe book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...
WeiterlesenThe book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, ...
WeiterlesenThe book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
WeiterlesenThere are many applications that require parallel and distributed processing to allow complicated engineering, business and ...
WeiterlesenThis publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research ...
Weiterlesen