You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, held in Gurugram, India, in November 2019. The 74 revised full papers presented were carefully reviewed and selected from total 353 submissions. The papers are organized in topical sections on data centric programming; next generation computing; social and web analytics; security in data science analytics; big data analytics.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during February 23–25, 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
This book constitutes the proceedings of the International Joint Conference on Rough Sets, IJCRS 2022, held in Suzhou, China, in November 2022. The 28 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Invited papers, IRSS President Forum; rough set theory and applications; granular computing and applications; classification and deep learning; conceptual knowledge discovery and machine learning based on three-way decisions and granular computing; uncertainty in three-way decisions; granular computing, and data science.
The book Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The Conference attracted a total of 545 submissions from many academic pioneering researchers, scientists, industrial engineers, students from all around the world. These submissions underwent a double-blind peer review process. Of those 545 submissions, 177 submissions have been selected to be included in these proceedings. As intelligent systems continue to replace and sometimes outperform human intelligence in decisi...
As the advancement of technology continues, cyber security continues to play a significant role in todays world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.
The book presents high-quality research papers presented at the 1st AUE International research conference, AUEIRC 2017, organized by the American University in the Emirates, held on November 15th-16th, 2017 in Dubai. The book is broadly divided into three sections: Media and Smart Cities, Creative Technologies and Innovation, and Security Risks and Strategic Challenges. The areas covered under these sections are cyber-psychology and digital forensics, cloud RAN architecture, networking functions virtualization, e-Governance and IoT semantic interoperability, ERP security, web-based application and problem-solving skills, smart technologies and advertising, smart technologies for smart cities...
This book features high-quality research papers presented at the International Conference on Applications and Techniques in Cyber Security and Digital Forensics (ICCSDF 2021), held at The NorthCap University, Gurugram, Haryana, India, during April 3–4, 2021. This book discusses the topics ranging from information security to cryptography, mobile application attacks to digital forensics, and from cyber security to blockchain. The goal of the book is to provide 360-degree view of cybersecurity to the readers which include cyber security issues, threats, vulnerabilities, novel idea, latest technique and technology, and mitigation of threats and attacks along with demonstration of practical applications. This book also highlights the latest development, challenges, methodologies as well as other emerging areas in this field. It brings current understanding of common Web vulnerabilities while maintaining awareness and knowledge of contemporary standards, practices, procedures, and methods of Open Web Application Security Project. It also expounds how to recover information after a cybercrime.
Literacy research has continued to develop at a rapid pace in these last five years of the millennium. New ideas about how children learn to read have led to a better understanding of the causes of progress and failure in the mastery of literacy, with repercussions for children's assessment and teacher education. These new discoveries also allow teachers to transcend the old debates in reading instruction (phonics versus whole language) and offer the path to a synthesis. At the same time, research with teachers about their own implementation of methods and the development of their own knowledge about the teaching of literacy has produced a fresh analysis of the practice of literacy teaching. Inspired by these developments, teachers, teacher educators and researchers worked together to produce this volume, which promotes the integration of literacy research and practice.