This book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue readingComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple commercial ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Computer Supported ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue readingThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue readingThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue readingproceedings. ACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer ...
Continue readingACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer vision is ...
Continue readingThe privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue readingThe privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue reading