anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; internet; network security; wireless; we
International audienceThis book constitutes the thoroughly refereed post-conference proceedings of t...
This book constitutes the refereed proceedings of the 6th International Conference on Information Pr...
Modern critical infrastructures (“critical entities” in the terminology of the new EU-CER Directive)...
anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; intern...
Contains fulltext : 76048.pdf (publisher's version ) (Closed access)167 p
This open access book constitutes the thoroughly refereed proceedings of the First International ISC...
This book constitutes the refereed proceedings of the 9th IFIP WG 6.6 International Conference on In...
Most industrialized countries benefit from a high level of both safety and security. However, it bec...
This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless In...
International audienceThis book constitutes the revised selected papers from the 12th International ...
This article is a report of the IFIP AIMS 2016, which was held at Universität der Bundeswehr München...
This article is a report of the IFIP AIMS 2014, which was held at Masaryk University, Czech Republic...
The First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held ...
Book Front Matter of LNCS 7371International audienceThe 17 revised full and 15 short papers presente...
This book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and...
International audienceThis book constitutes the thoroughly refereed post-conference proceedings of t...
This book constitutes the refereed proceedings of the 6th International Conference on Information Pr...
Modern critical infrastructures (“critical entities” in the terminology of the new EU-CER Directive)...
anomaly detection; artificial intelligence; cloud computing; data security; cyber crime; intern...
Contains fulltext : 76048.pdf (publisher's version ) (Closed access)167 p
This open access book constitutes the thoroughly refereed proceedings of the First International ISC...
This book constitutes the refereed proceedings of the 9th IFIP WG 6.6 International Conference on In...
Most industrialized countries benefit from a high level of both safety and security. However, it bec...
This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless In...
International audienceThis book constitutes the revised selected papers from the 12th International ...
This article is a report of the IFIP AIMS 2016, which was held at Universität der Bundeswehr München...
This article is a report of the IFIP AIMS 2014, which was held at Masaryk University, Czech Republic...
The First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held ...
Book Front Matter of LNCS 7371International audienceThe 17 revised full and 15 short papers presente...
This book constitutes the refereed proceedings of the 11th Pacific Asia Workshop on Intelligence and...
International audienceThis book constitutes the thoroughly refereed post-conference proceedings of t...
This book constitutes the refereed proceedings of the 6th International Conference on Information Pr...
Modern critical infrastructures (“critical entities” in the terminology of the new EU-CER Directive)...