Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue reading
Examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Continue reading
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Continue reading
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Continue reading
Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...
Continue reading
In the ten chapters of this book, a broad set of practical process knowledge is p- sented, comprising simulation techniques, ...
Continue readingThis book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous ...
Continue readingThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
Continue reading
Seismic Retrofit of Existing Reinforced Concrete Buildings readers will also find: Detailed treatment of each available strengthening ...
Continue reading
The processes of tumor metastasis, apoptosis and anti-tumor immune response are among the most complex yet rapidly advancing ...
Continue reading
This was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
Continue reading
This volume of selected papers is A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public ...
Continue reading
The field of convex geometry has become a fertile subject of mathematical activity in the past few decades. This exposition, ...
Continue readingIn view of the rapid changes in requirements, it has became necessary to place at the reader's disposal a book dealing with ...
Continue reading
Contains lecture notes written by the lecturers of the NATO Advanced Study Institute. This book gives examples of self-organization ...
Continue reading
This book proposes, utilizes, and demonstrates the research superiority of a highly developed multidisciplinary theory models ...
Continue readingThe EQ-5D instrument, as a standardized, cross-culturally validated measure of self-assessed health has a hugely important ...
Continue reading
Information systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
Continue reading
This book constitutes the refereed proceedings of the First International Conference on Semantics and Digital Media Technologies, ...
Continue reading
The book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
Continue reading