Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Lee masExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lee masThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lee masThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Lee masT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Lee masThe book will present a variety of on-going efforts to provide new results and solutions to the problem of service productivity. ...
Lee masThis book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science ...
Lee masPresents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, ...
Lee masSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...
Lee masProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
Lee masThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Lee masIn our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, ...
Lee masThis book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...
Lee masPulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...
Lee masThis book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
Lee masIn 1965 Lotfi Zadeh, a professor of electrical engineering at the University of California in Berkeley, published the first ...
Lee masThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...
Lee masevaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...
Lee masInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lee masYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lee mas