covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...
Continue reading
This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
Continue readingThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
Continue reading
Describes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Continue reading
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue readingThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Continue reading
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Continue reading
Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
Continue reading
At the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...
Continue reading
The book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Continue reading
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Continue reading
The 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...
Continue readingThis edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...
Continue reading
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...
Continue reading
By presenting state-of-the-art results in logical reasoning and formal methods in the context of artificial intelligence ...
Continue readingThe rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...
Continue reading
This publication is meant to foster links between groups facing challenges cleaning up contaminated sites through presentations ...
Continue readingCoherent sources of mid-infrared (mid-IR) radiation are of great interest for a wide range of scienti?c and technological ...
Continue reading