This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lire la suiteThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
Lire la suiteWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
Lire la suiteWith the advent of the Digital Library initiative, web document processing and biometric aspects of digital document processing, ...
Lire la suiteThis book analyzes the dynamics and impacts of software development and discusses new institutional and economic changes ...
Lire la suiteIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
Lire la suiteThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Lire la suiteThis two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference ...
Lire la suiteThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
Lire la suiteThis volume consists of three parts. The first part contains the papers/abstracts of the invited talks, the second part contains ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Distributed Computing and Internet Technology, ...
Lire la suiteThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
Lire la suiteThe book covering the areas of algorithms, applications, and systems, thus bridging the gap between theory and practice and ...
Lire la suiteThe book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, ...
Lire la suiteThe book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, ...
Lire la suiteThe book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, ...
Lire la suiteThere are many applications that require parallel and distributed processing to allow complicated engineering, business and ...
Lire la suiteThis publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research ...
Lire la suite