This book constitutes the reviewed proceedings of the first International Conference on Cloud Com...
Developing secure software requires the integration of numerous methods and tools into the dev...
Developing secure software requires the integration of numerous methods and tools into the dev...
This book constitutes the refereed procedings of the 5th International Conference on Autonomic an...
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificia...
This book highlights advances in cyber security, cyber situational awareness (CyberSA), artificia...
This book constitutes the reviewed proceedings of the first International Conference on Cloud Com...
This book constitutes the refereed procedings of the 5th International Conference on Autonomic an...
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificia...
This book highlights advances in cyber security, cyber situational awareness (CyberSA), artifi...
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificia...
This book introduces the reader to the fundamentals of empirical research methods, and demonstrat...