Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Lire la suiteExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lire la suiteThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lire la suiteThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Lire la suiteT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Lire la suiteThe book will present a variety of on-going efforts to provide new results and solutions to the problem of service productivity. ...
Lire la suiteThis book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science ...
Lire la suitePresents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, ...
Lire la suiteSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...
Lire la suiteProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
Lire la suiteThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Lire la suiteIn our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, ...
Lire la suiteThis book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...
Lire la suitePulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...
Lire la suiteThis book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
Lire la suiteIn 1965 Lotfi Zadeh, a professor of electrical engineering at the University of California in Berkeley, published the first ...
Lire la suiteThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...
Lire la suiteevaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suite