![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
For more than a decade, Foundations of Software Technology and Theoretical Computer Science Conferences have been providing an annual academic computerscience forum for the presentation of new results in the topics of current research in India and abroad. This year, there was a total of 125 papers from 14 countries. Each paper was reviewed by at least three reviewers; based on these reviews, the programme committee selected 28 papers at a meeting held in July 1992 at the Tata Institute of Fundamental Research, Bombay. The selected papers are included in this volume, together with three invited papers: "Games and full completeness for multiplicative linear logic" by S. Abramsky, "Recent developments inalgorithms for the maximum-flow problem" by K. Melhorn, and "System specification and refinement in temporal logic" by A. Pnueli.
|
![]() ![]() You may like...
The Vertebrate Blood-Gas Barrier in…
Andrew N Makanya
Hardcover
Pain Management for the Small Animal…
William Tranquilli, Kurt Grimm, …
Book
R2,115
Discovery Miles 21 150
Garden City - The First 150 Years
Constantine E. Theodosiou, Emmanuel C Theodosiou
Hardcover
R762
Discovery Miles 7 620
|