The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
Learn to deliver superior server-to-server communication through the networking channels Gain expertise of the networking ...
Continue reading
The book provides the reader with a comprehensive overview of stream data processing, including famous prototype implementations ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
In recent years the question of the legitimacy of international law has been discussed quite intensively. Such questions ...
Continue reading
These proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
Continue reading
This volumecontainsa selectionofthe the paperspresentedatthe 17thInter- tional Symposium on Logic-Based Program Synthesis ...
Continue reading
Designed to help you make the most of your study time. Maximize your performance on the exam by learning to: * Monitor and ...
Continue reading
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
Continue reading
Covers the multidimensional perspective of machine learning through the perspective of cloud computing and Internet of Things ...
Continue reading
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Continue reading
covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...
Continue reading
This book is intended to present the state of the art in research on machine learning and big data analytics. The accepted ...
Continue reading
This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
Continue readingThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
Continue reading
Describes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Continue reading
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading