This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Lire la suiteThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suiteThis book constitutes the refereed proceedings of the 13th International Working Conference on Requirements Engineering: ...
Lire la suiteProceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...
Lire la suiteThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Lire la suiteCities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...
Lire la suiteSoftware reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Lire la suiteIn Risk Parity: How to Invest for All Market Environments, accomplished investment consultant Alex Shahidi delivers a powerful ...
Lire la suiteThe subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Lire la suiteThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lire la suiteIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lire la suiteThis brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
Lire la suiteAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suitethe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lire la suiteThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suiteNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lire la suiteData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Lire la suiteThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
Lire la suite