This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue readingThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
Continue readingWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
Continue readingWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
Continue readingThis book analyzes the dynamics and impacts of software development and discusses new institutional and economic changes ...
Continue readingIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
Continue readingThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Continue readingThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Continue readingThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
Continue readingThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
Continue readingThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
Continue readingThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
Continue readingThe book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...
Continue readingThe book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, ...
Continue readingThe book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
Continue readingThere are many applications that require parallel and distributed processing to allow complicated engineering, business and ...
Continue readingThis publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research ...
Continue reading