This book constitutes the thoroughly refereed post-conference proceedings of the Second Internati...
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Techno...
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Techno...
This book provides the foundational aspects of malware attack vectors and appropriate defense mec...
The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threa...
The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threa...
This book constitutes the refereed post-conference proceedings of the 16th International Conferen...
This book addresses the growing need for a comprehensive guide to the application of machine lear...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However,...
Nowadays in cyberspace, there is a burst of information to which everyone has access. However,...
This book constitutes the thoroughly refereed post-conference proceedings of the Second Internati...
This book addresses the growing need for a comprehensive guide to the application of machine l...