security artificial intelligence ai algorithms data mining automata theory blockchain privacy hdfs web mining natural language processing privacy preserving watermarking k-nn classifier software engineering ai in healthcare ai in cyber security ai in network & communications engineering computer science intrusion detection system denial of service mechatronics information retrieval information flow control web service open source software curriculum reform andtrends diversity in education education for development e-learning savi solutions network ingress filtering ip spoofing attack clustering machine learning analogical learning methods dependable bioinformatics big data trust iot software engineering semantic processing chunking phonology morphology application layer security dos object capability model cheri architecture authentication access control deep learning mobile and sensor networks • policy of trust in e- clusters and grid computing : security and role of p2p authentication and identity management • pervasive policy management • agent based trust management • • trust
Tout plus