This book focuses on how machine learning techniques can be used to analyze and make use of one p...
This book introduces novel research targeting technical aspects of protecting information securit...
This book presents the latest developments in biometrics technologies and reports on new approach...
This book constitutes the refereed proceedings of the Second International Conference on Intellig...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This book introduces fundamental AI ML principles and concepts applied in developing secure and t...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This book presents the latest developments in biometrics technologies and reports on new approach...
This book introduces novel research targeting technical aspects of protecting information secu...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This book introduces novel research targeting technical aspects of protecting information secu...
This book focuses on how machine learning techniques can be used to analyze and make use of one p...