Electronic Books

Total Books: 41 - 60 /61
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

Lee mas
Management of Convergence Networks and Services

Constitutes the refereed proceedings of the 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006. This ...

Lee mas
Managing Next Generation Networks and Services

The 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...

Lee mas
Mobility Aware Technologies and Applications

The beginning of the twenty-first century is characterized by global markets, and the mobility of people is becoming an important ...

Lee mas
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
PRICAI 2008: Trends in Artificial Intelligence : 10th Pacific Rim International Conference on Artificial Intelligence, Hanoi, Vietnam, December 15-19, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Pacific Rim International Conference on Artificial Intelligence, ...

Lee mas
Privacy Enhancing Technologies (vol. # 3424)

Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...

Lee mas
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Lee mas
Privacy-Respecting Intrusion Detection

With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...

Lee mas
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

Lee mas
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Lee mas
Recent Advances in Intrusion Detection

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...

Lee mas
Recent Advances in Intrusion Detection (vol. # 3858)

This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...

Lee mas
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

Lee mas
Reconfigurable Computing: Architectures, Tools and Applications

This book constitutes the refereed proceedings of the Third International Workshop on Applied Reconfigurable Computing, ARC ...

Lee mas
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

Lee mas
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lee mas
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Lee mas
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

Lee mas
Total Books: 41 - 60 /61