This book introduces novel research targeting technical aspects of protecting information securit...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
The Sudanese peace agreement reached a crisis point in its final year. This book offers an analys...
This book constitutes thoroughly reviewed and selected short papers presented at the 25th Ea...
This concise book meets the market need for an accessible and up-to-date guide on understanding a...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 1...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
The Sudanese peace agreement reached a crisis point in its final year. This book offers an analys...