Provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet ...
Lire la suite
                This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Lire la suite
                Biomedical imaging is a fascinating research area to applied mathematicians. Challenging imaging problems arise and they ...
Lire la suite
                When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern ...
Lire la suiteThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions ...
Lire la suite
                Introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their ...
Lire la suite
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suite
                This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suite
                This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suite
                This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...
Lire la suite
                The 2007 NSF BioSurveillance Workshop (BioSurveillance 2007) was built on the success of the first NSF BioSurveillance Workshop, ...
Lire la suite
                This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Lire la suite
                This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
Lire la suite
                This volume of the Lecture Notes in Computer Science series contains all papers th accepted for presentation at the 18 IFIP/IEEE ...
Lire la suite
                Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Lire la suite
                This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Lire la suite
                This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Lire la suite
                This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suite
                This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Lire la suite
                This volume continues to survey the evolving field of text mining - the application of techniques of machine learning, in ...
Lire la suite