This book constitutes the refereed proceedings of the First International Conference on Security ...
Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by wor...
This book provides detailed practical guidelines on how to develop an efficient pathological brai...
This book provides detailed practical guidelines on how to develop an efficient pathological brai...
This book supplies an unprecedented look at the latest research on the networking and communicati...
This two-volume book constitutes the refereed proceedings of the Second International Conference ...
This brief presents emerging and promising communication methods for network reliability via dela...
This book supplies an unprecedented look at the latest research on the networking and communicati...
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons...
Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by wor...
This two-volume book constitutes the refereed proceedings of the Second International Conference ...
This brief provides readers a complete and self-contained resource for information about DDoS att...