Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue readingExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Continue readingThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Continue readingThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Continue readingRecent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...
Continue readingIn the ten chapters of this book, a broad set of practical process knowledge is p- sented, comprising simulation techniques, ...
Continue readingThis book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous ...
Continue readingThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
Continue readingSeismic Retrofit of Existing Reinforced Concrete Buildings readers will also find: Detailed treatment of each available strengthening ...
Continue readingThe processes of tumor metastasis, apoptosis and anti-tumor immune response are among the most complex yet rapidly advancing ...
Continue readingThis was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
Continue readingThis volume of selected papers is A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public ...
Continue readingThe field of convex geometry has become a fertile subject of mathematical activity in the past few decades. This exposition, ...
Continue readingIn view of the rapid changes in requirements, it has became necessary to place at the reader's disposal a book dealing with ...
Continue readingContains lecture notes written by the lecturers of the NATO Advanced Study Institute. This book gives examples of self-organization ...
Continue readingThis book proposes, utilizes, and demonstrates the research superiority of a highly developed multidisciplinary theory models ...
Continue readingThe EQ-5D instrument, as a standardized, cross-culturally validated measure of self-assessed health has a hugely important ...
Continue readingInformation systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Semantics and Digital Media Technologies, ...
Continue readingThe book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
Continue reading