This book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
Lee mas
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lee mas
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lee mas
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lee mas
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Lee mas
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lee mas
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Lee mas
Examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lee mas
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Lee mas
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lee mas
Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...
Lee mas
This book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed ...
Lee mas
In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
Lee mas
This was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
Lee mas
This volume of selected papers is A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public ...
Lee mas
This book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Lee mas
Information systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
Lee mas
Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...
Lee mas
The book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
Lee mas
This book cover topics such as: web semantics and linked (open) data; machine learning and deep learning techniques; semantic ...
Lee mas