21
Published 2014
Springer India
Table of Contents: ...Evaluation of Software Understandability Using Rough Sets -- HCDLST: An Indexing Technique...

22
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Monitoring and Analysis Framework -- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc...

23
Published 2017
Springer International Publishing
Table of Contents: ...-MRF -- Infant monitoring system using wearable sensors based on blood oxygen saturation -- Network...

24
Published 2023
Springer Nature Switzerland
Table of Contents: ... Techniques -- Predictive Models of Air Pollution through the Implementation of a Mobile Monitoring System...

25
Published 2022
Springer International Publishing
Table of Contents: ... -- Monitoring and Prediction of Drinking Water Consumption -- Visualization of the regular mobility of trips...

26
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Identification and Prioritisation of Criminal Networks from Police Crime Data -- An Information Theory Approach...

27
Published 2022
Springer Nature Singapore
Table of Contents: ... and Information Technology -- Applying an IoT Analytics Framework in East Asia Area -- Android Malware Classifier...

28
by Kotipalli, Srinivasa Rao, Imran, Mohammed A.
Published 2016
Packt Publishing
Table of Contents: ... -- Native apps -- Hybrid apps -- Understanding the app's attack surface -- Mobile application architecture...

29
Published 2021
Springer International Publishing
Table of Contents: ... SteganographyScheme Based on 3D Slice Technology -- Software Information Hiding Algorithm Based on Import Table...

30
Published 2024
Springer Nature Switzerland
Table of Contents: .... -- Multi-modal Machine learning model for Interpretable Mobile Malware Classification. -- Explainable Fraud...

31
Published 2021
Springer International Publishing
Table of Contents: ... with Virtual Machine Monitoring -- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical...

32
Published 2021
Springer International Publishing
Table of Contents: ... Security Metrics -- Requirements for IoT Forensic Models - A Review -- Mobile Malware Forensics Review...

33
Published 2017
Springer Nature Singapore
Table of Contents: ... Sensor Networks -- Chapter 46. Mining Frequent Quality Factors of Software System using Apriori Algorithm...

34
Published 2020
Springer International Publishing
Table of Contents: ..., CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption...

35
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Approach for Mission-Level Detection and Response -- Monitoring the Execution of Third-Party Software...

36
Published 2017
Springer International Publishing
Table of Contents: ...An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm -- CCN...

37
Published 2015
Springer International Publishing
Table of Contents: ... Research Vehicle (ARV) System -- Monitoring Electronic Exams -- Monitoring Real Android Malware -- Time...

38
by Messier, Ric
Published 2019
McGraw-Hill
Table of Contents: ... -- Types of Security Threats -- Social Engineering -- Malware -- Identity Theft -- Mobile Device Threats...

39
by Hammoudi, Samir
Published 2016
Packt Publishing
Subjects: ...COMPUTERS / Information Technology / bisacsh...

40
Published 2021
Springer International Publishing
Table of Contents: ... and Computing -- Collection and consolidation of big data for proactive monitoring of critical events...