Electronic Books

Total Books: 441 - 460 /774
Machine Learning Techniques and Analytics for Cloud Security / Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal

covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...

Lee mas
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

Lee mas
NoIMG
Machine Learning and Knowledge Extraction : 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings

This book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...

Lee mas
Machine Learning for Computer Scientists and Data Analysts : From an Applied Perspective / Setareh Rafatirad, Houman Homayoun, Zhiqian Chen, Sai Manoj Pudukotai Dinakarrao

Describes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...

Lee mas
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

Lee mas
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lee mas
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lee mas
NoIMG
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Lee mas
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Lee mas
Malware Detection

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...

Lee mas
Managing Critical Infrastructure Risks

At the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...

Lee mas
Managing Information Systems Security and Privacy

The book deals with the management of information systems security and privacy, based on a model that covers technological, ...

Lee mas
Managing Large-Scale Service Deployment : 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...

Lee mas
Managing Next Generation Networks and Services

The 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...

Lee mas
NoIMG
Managing Risk and Information Security : Protect to Enable

This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...

Lee mas
Managing Risk and Information Security : Protect to Enable

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...

Lee mas
Mechanizing Mathematical Reasoning

By presenting state-of-the-art results in logical reasoning and formal methods in the context of artificial intelligence ...

Lee mas
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

Lee mas
Methods and Techniques for Cleaning-up Contaminated Sites

This publication is meant to foster links between groups facing challenges cleaning up contaminated sites through presentations ...

Lee mas
NoIMG
Mid-Infrared Coherent Sources and Applications

Coherent sources of mid-infrared (mid-IR) radiation are of great interest for a wide range of scienti?c and technological ...

Lee mas
Total Books: 441 - 460 /774