-
-
Losing the Cybersecurity War
Ingram 出版An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach c
-
Security and Privacy Trends in Cloud Computing and Big Data
Ingram 出版This book explores the security and privacy issues of Cloud Computing and Big Data, providing essen
-
Advances in Cryptology - Eurocrypt 2022
Springer 出版The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annua
-
Social Media in the Digital Age
Ingram 出版Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and
-
Mastering Palo Alto Networks - Second Edition
Packt 出版Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructureKey
-
Knowledge Management (Km) Processes in Organizations
Springer 出版Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a na
-
Automated Essay Scoring
Springer 出版This book discusses the state of the art of automated essay scoring, its challenges and its potenti
-
Domain-Sensitive Temporal Tagging
Springer 出版This book covers the topic of temporal tagging, the detection of temporal expressions and the norma
-
Argumentation Mining
Springer 出版Argumentation mining is an application of natural language processing (NLP) that emerged a few year
-
Linguistic Fundamentals for Natural Language Processing
Springer 出版Many NLP tasks have at their core a subtask of extracting the dependencies--who did what to whom--f
-
Privacy for Location-based Services
Springer 出版Sharing of location data enables numerous exciting applications, such as location-based queries, lo
-
-
Advanced Metasearch Engine Technology
Springer 出版Among the search tools currently on the Web, search engines are the most well known thanks to the p
-
Embeddings in Natural Language Processing
Springer 出版Embeddings have undoubtedly been one of the most influential research areas in Natural Language Pro
-
Embracing Risk
Springer 出版This book provides an introduction to the theory and practice of cyber insurance. Insurance as an e
-
Modeling and Optimization in Software-Defined Networks
Springer 出版This book provides a quick reference and insights into modeling and optimization of software-define
-
Automated Software Diversity
Springer 出版Whereas user-facing applications are often written in modern languages, the firmware, operating sys
-
Information Architecture
Springer 出版Information Architecture is about organizing and simplifying information, designing and integrating
-
Conversational AI
Springer 出版This book provides a comprehensive introduction to Conversational AI. While the idea of interacting
-
-
-
Privacy Risk Analysis
Springer 出版Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the ba
-
Introduction to Chinese Natural Language Processing
Springer 出版This book introduces Chinese language-processing issues and techniques to readers who already have
-
Grammatical Inference for Computational Linguistics
Springer 出版This book provides a thorough introduction to the subfield of theoretical computer science known as
-
Introduction to Arabic Natural Language Processing
Springer 出版This book provides system developers and researchers in natural language processing and computation
-
Database Anonymization
Springer 出版The current social and economic context increasingly demands open data to improve scientific resear
-
-
Ontology-Based Interpretation of Natural Language
Springer 出版For humans, understanding a natural language sentence or discourse is so effortless that we hardly
-
Cross-Language Information Retrieval
Springer 出版Search for information is no longer exclusively limited within the native language of the user, but
-
RFID Security and Privacy
Springer 出版As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an
-
Secure Sensor Cloud
Springer 出版The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which fa
-
Quality Estimation for Machine Translation
Springer 出版Many applications within natural language processing involve performing text-to-text transformation
-
Discourse Processing
Springer 出版Discourse Processing here is framed as marking up a text with structural descriptions on several le
-
Web Corpus Construction
Springer 出版The World Wide Web constitutes the largest existing source of texts written in a great variety of l
-
-
-
-
-
Mobile Platform Security
Springer 出版Recently, mobile security has garnered considerable interest in both the research community and ind
-
Private Information Retrieval
Springer 出版This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve a
-
Wireless Network Pricing
Springer 出版Today's wireless communications and networking practices are tightly coupled with economic consider
-
Automatic Detection of Verbal Deception
Springer 出版The attempt to spot deception through its correlates in human behavior has a long history. Until re
-
Introduction to Linguistic Annotation and Text Analytics
Springer 出版Linguistic annotation and text analytics are active areas of research and development, with academi
-
-
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Springer 出版This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research
-
Privacy Risk Analysis of Online Social Networks
Springer 出版The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedente
-
Analysis Techniques for Information Security
Springer 出版Increasingly our critical infrastructures are reliant on computers. We see examples of such infrast