This book focuses on how machine learning techniques can be used to analyze and make use of one p...
This book introduces novel research targeting technical aspects of protecting information securit...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This book presents the latest developments in biometrics technologies and reports on new approach...
This book constitutes the refereed proceedings of the Second International Conference on Intellig...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This book presents advances in security assurance for cyber-physical systems (CPS) and report on ...
This book presents the latest developments in biometrics technologies and reports on new approach...
This book focuses on how machine learning techniques can be used to analyze and make use of one p...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This book introduces novel research targeting technical aspects of protecting information secu...
This book constitutes the refereed proceedings of the First International Conference on Intellige...