Computer and Information Science

Computer and Information Science

Computer and Information Science


Privacy and Security in Cloud Computing: Methods and Techniques

Privacy and Security in Cloud Computing: Methods and Techniques

Cloud computing has transformed the way businesses and individuals store, access, and process data. ..

$165.00

Cybersecurity for Cyber-Physical Systems: Challenges and Solutions

Cybersecurity for Cyber-Physical Systems: Challenges and Solutions

Cyber-physical systems, which combine physical elements with computing and communication capabilitie..

$165.00

Cybersecurity in Emerging Technologies

Cybersecurity in Emerging Technologies

As emerging technologies like artificial intelligence, blockchain, and the Internet of Things contin..

$165.00

Advances in Intelligent Systems and Computing

Advances in Intelligent Systems and Computing

Intelligent systems and computing have seen significant advancements in recent years, with innovatio..

$165.00

Blockchain and Decentralized Trust Management for Cloud and Edge Computing

Blockchain and Decentralized Trust Management for Cloud and Edge Computing

Blockchain technology provides a decentralized and secure system for managing digital transactions a..

$165.00

Real-Time Embedded Systems

Real-Time Embedded Systems

Real-time embedded systems are those that incorporate a real-time operating system, ensuring that th..

$165.00

Advances in Grid Computing

Advances in Grid Computing

Grid computing provides an architecture for creating a virtual supercomputer made up of distributed ..

$165.00

Applications of Pattern Recognition

Applications of Pattern Recognition

Pattern Recognition is a mature but exciting and fast-developing field, which underpins developments..

$165.00

Network Reliability: Measures and Evaluation

Network Reliability: Measures and Evaluation

Network reliability is a critical factor in mission critical industrial automation and control netwo..

$165.00

Software Networks: Virtualization, SDN, 5G, and Security

Software Networks: Virtualization, SDN, 5G, and Security

Today, the Internet is key to almost any social or economic activity. In 10 years, it will be even m..

$165.00

Wireless Communication Security

Wireless Communication Security

Currently, wireless communications vulnerabilities are on the increase due to the higher demand for ..

$160.00

Search Engine Optimization and Marketing

Search Engine Optimization and Marketing

Today’s world revolves around information that is the driving force behind any economic value chain...

$160.00

Symbol recognition 

Symbol recognition 

The recognition of symbols in graphic documents is an intensive research activity in the community o..

$160.00

Graphics Recognition: Algorithms and Systems

Graphics Recognition: Algorithms and Systems

We are in an era where information is at the core of many industrial strategies. New information-cen..

$160.00

Vehicular ad hoc network (VANET)

Vehicular ad hoc network (VANET)

VANETs can be used for many applications with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure..

$160.00

Showing 1 to 15 of 63 (5 Pages)