Malware Analysis Using Artificial Intelligence and Deep Learning |
- isbn : 978-3-030-62582-5
- pisbn : 978-3-030-62581-8
- doi : 10.1007/978-3-030-62582-5
|
Fulltext
|
Internet of Things Security: Principles and Practice |
- isbn : 978-981-15-9942-2
- pisbn : 978-981-15-9941-5
- doi : 10.1007/978-981-15-9942-2
|
Fulltext
|
Data Analytics in the Era of the Industrial Internet of Things |
- isbn : 978-3-030-63139-0
- pisbn : 978-3-030-63138-3
- doi : 10.1007/978-3-030-63139-0
|
Fulltext
|
Embedded Software Timing |
- isbn : 978-3-030-64144-3
- pisbn : 978-3-030-64143-6
- doi : 10.1007/978-3-030-64144-3
|
Fulltext
|
Fluctuation-Induced Network Control and Learning |
- isbn : 978-981-33-4976-6
- pisbn : 978-981-33-4975-9
- doi : 10.1007/978-981-33-4976-6
|
Fulltext
|
Automotive Software Architectures |
- isbn : 978-3-030-65939-4
- pisbn : 978-3-030-65938-7
- doi : 10.1007/978-3-030-65939-4
|
Fulltext
|
Essential Spectrum-based Fault Localization |
- isbn : 978-981-33-6179-9
- pisbn : 978-981-33-6178-2
- doi : 10.1007/978-981-33-6179-9
|
Fulltext
|
Reinforcement Learning Aided Performance Optimization of Feedback Control Systems |
- isbn : 978-3-658-33034-7
- pisbn : 978-3-658-33033-0
- doi : 10.1007/978-3-658-33034-7
|
Fulltext
|
Touch-Based Human-Machine Interaction |
- isbn : 978-3-030-68948-3
- pisbn : 978-3-030-68947-6
- doi : 10.1007/978-3-030-68948-3
|
Fulltext
|
Socio-Technical Aspects in Security and Trust |
- isbn : 978-3-030-55958-8
- pisbn : 978-3-030-55957-1
- doi : 10.1007/978-3-030-55958-8
|
Fulltext
|