The Sudanese peace agreement reached a crisis point in its final year. This book offers an analys...
This book introduces novel research targeting technical aspects of protecting information securit...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
The Sudanese peace agreement reached a crisis point in its final year. This book offers an analys...
This concise book meets the market need for an accessible and up-to-date guide on understanding a...
This book constitutes thoroughly reviewed and selected short papers presented at the 25th Ea...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 1...
This book constitutes thoroughly reviewed and selected short papers presented at the 25th East-Eu...