for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
mso-ansi-language: EN-US;">The 178 full papers presented were... Læs mere
Bemærk: Kan ikke leveres før jul.
mso-ansi-language: EN-US;">This two-volume set LNCS 15998-15999... Læs mere
Bemærk: Kan ikke leveres før jul.
mso-bidi-font-weight: bold;">The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
Bemærk: Kan ikke leveres før jul.
This two-volume set constitutes the refereed proceedings of the 17th... Læs mere
Bemærk: Kan ikke leveres før jul.
This edited book aims to comprehensively examine the current research trend, state-of-the-art IoT applications, deployment issues, potential challenges, and... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Resilience, unlike the concept of security (which is often and incorrectly conflated with resilience) refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance.
Bemærk: Kan ikke leveres før jul.
The papers present recent research in the areas of communication, antenna, computer vison, medical image analysis, deep learning, AI based systems and applications, classification problem, embedded system and IoT, etc.
Bemærk: Kan ikke leveres før jul.
The papers present recent research in the areas of communication, antenna, computer vison, medical image analysis, deep learning, AI based systems and applications, classification problem, embedded system and IoT, etc.
Bemærk: Kan ikke leveres før jul.
Artificial intelligence (AI) and machine learning (ML) have emerged as transformative tools in cybersecurity, enabling organizations to detect, prevent, and respond to threats with greater efficiency.
Bemærk: Kan ikke leveres før jul.
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks.