This book provides an introduction to software-defined radio and cognitive radio, along with meth...
Cognitive models and software tools have been widely used for both research and commercial purpos...
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop ...
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th In...
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th In...
Cryptography.- Authentication.- Privacy and Anonymity.- Attacks and Vulnerability Analysis.- Arti...
This book constitutes the refereed proceedings of the 17th International Conference on Network an...
Information Abuse and Political Discourse: People Still Care About Facts: Twitter Users Engage Mo...
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 20...
This book provides an introduction to software-defined radio and cognitive radio, along with meth...
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 20...