This book constitutes the thoroughly refereed post-conference proceedings of the Second Internati...
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Techno...
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Techno...
This book provides the foundational aspects of malware attack vectors and appropriate defense mec...
The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threa...
The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threa...
This book constitutes the refereed post-conference proceedings of the 16th International Conferen...
This book addresses the growing need for a comprehensive guide to the application of machine lear...
This book constitutes the thoroughly refereed post-conference proceedings of the Second Internati...
This book provides the foundational aspects of malware attack vectors and appropriate defense mec...
This book constitutes the refereed post-conference proceedings of the 16th International Confe...
This book addresses the growing need for a comprehensive guide to the application of machine l...