This textbook is designed to introduce and deepen the understanding of drone technology in the fi...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Con...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Con...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Con...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Con...
The Internet of Things (IoT) has emerged due to information and communication technology developm...
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and ap...
Research on Secure Key Establishment has become very active within the last few years. Secure Key...
This handbook provides comprehensive knowledge and includes an overview of the current state-of-t...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and a...
This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligen...
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, a...
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th Inte...
This book provides an in-depth understanding of big data challenges to digital forensic investiga...
Unser bisheriger Preis:ORGPRICE: 65,00 €
This book presents the combined proceedings of the 12th International Conference on Multimedia a...
This book presents the outcomes of the 2017 International Conference on Applications and Techniqu...
These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Securi...
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream are...
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the fir...
This book constitutes the refereed proceedings of the 9th International Conference on Computation...
This handbook provides an overarching view of cyber security and digital forensic challenges rela...
This book presents the proceedings of the 11 sup thsupInternational Conference on Multimedia and ...
This book presents a collection of state-of-the-art approaches to utilizing machine learning, fo...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and a...
This book presents a collection of state-of-the-art approaches to utilizing machine learning, fo...
This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive S...
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosyste...
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream are...
This book constitutes the proceedings of the 17th International Conference on Algorithms and Arch...
This handbook discusses challenges and limitations in existing solutions, and presents state-of-t...
This book constitutes the refereed proceedings of the 7th International Conference on Smart City ...
This book provides an in-depth understanding of big data challenges to digital forensic investiga...
In this book, the editors explain how students enrolled in two digital forensic courses at their ...
Research on Secure Key Establishment has become very active within the last few years. Secure Key...
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively dis...
This handbook provides comprehensive knowledge and includes an overview of the current state-of-t...
This book constitutes the refereed proceedings of the 10th International Conference on Security, ...
This book presents findings from the papers accepted at the Cyber Security Education Stream and C...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15 th Inter...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15 th Inter...
Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensi...
In this book, the editors explain how students enrolled in two digital forensic courses at their ...
This book presents the proceedings of the 11 sup thsupInternational Conference on Multimedia and ...
This book addresses the adoption of intelligent algorithms for resolving challenges in different ...
Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensi...
This book presents findings from the papers accepted at the Cyber Security Education Stream and C...
This book features selected papers from the 7th International Conference on Mathematics and Compu...
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquit...