This book constitutes a flagship driver towards presenting and supporting advance research in the...
This book consists of eight chapters, five of which provide a summary of the tutorials and worksh...
This book collects many of the presented papers, as plenary presentations, mini-symposia invited ...
This book constitutes the thoroughly refereed post-conference proceedings of the First Internatio...
The 12 revised full papers, including 1 invited paper,were carefully reviewed and selected from 2...
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety an...
Many applications generate large datasets, like social networking and social influence programs, ...
Many applications generate large datasets, like social networking and social influence programs, ...
This book provides a review of advanced topics relating to the theory, research, analysis and imp...
This book addresses a potential radiation incident caused by the war in Ukraine, from an interdis...
This book constitutes the thoroughly refereed post-conference proceedings of the First Internatio...
This book collects many of the presented papers, as plenary presentations, mini-symposia invit...