You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the past few years, secure information sharing became very popular in the area of immigration, military applications, healthcare, education, foreign affairs, etc. As secure communication utilizes both wireless and wired communication mechanizations for exchanging sensitive information, security and privacy of the information exchange cannot be easily compromised. To moderate the security, integrity, authenticity, and privacy issues related to information exchange, numerous authentication mechanisms have been recommended by different researchers in the literature in recent times, but these are vulnerable to prospective security flaws such as masquerade, insider, replay, impersonation, pass...
A timely look at the personalities and factions contending for power in Riyadh as one princely order crumbles and another asserts itself
This book constitutes the proceedings of the 19th International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2023, which was held in Bhubaneswar, India, in January 2023. The 20 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections: Invited Talks; Distributed Computing; Intelligent Technology.
This volume constitutes the refereed proceedings of the 12th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2020, held in Phuket, Thailand, in March 2020. The total of 50 full papers accepted for publication in these proceedings were carefully reviewed and selected from 180 submissions. The papers are organized in the following topical sections: advanced big data, machine learning and data mining; industry applications of intelligent methods and systems; artificia intelligence, optimization, and databases in practical applications; intelligent applications of internet of things; recommendation and user centric applications of intelligent systems.
This book constitutes the refereed proceedings of the 9th International Conference on Intelligent Computing, ICIC 2013, held in Nanning, China, in July 2013. The 192 revised full papers presented in the three volumes LNCS 7995, LNAI 7996, and CCIS 375 were carefully reviewed and selected from 561 submissions. The papers in this volume (CCIS 375) are organized in topical sections on Neural Networks; Systems Biology and Computational Biology; Computational Genomics and Proteomics; Knowledge Discovery and Data Mining; Evolutionary Learning and Genetic Algorithms; Machine Learning Theory and Methods; Biomedical Informatics Theory and Methods; Particle Swarm Optimization and Niche Technology; Uns...
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.
The International Conference on Intelligent Computing (ICIC) was set up as an annual forum dedicated to emerging and challenging topics in the various aspects of advances in computational intelligence fields, such as artificial intelligence, machine learning, bioinformatics, and computational biology, etc. The goal of this conference was to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. This book constitutes the proceedings of the International Conference on Intelligent Computing (ICIC 2005), held in Hefei, Anhui, China, during August 23–26, 2005. ICIC 2005 r...
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber ...
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle. This book presents emergent methodologies and technological approaches of natural language processing through machine learning for counteracting the spread of fake news and hate speech on social media platforms. • Covers various approaches, algorithms, and methodologies for fake news and hate speech detection. • Explains the automatic detection and prevention of fake news and hate speech through paralinguistic clues on social media using artificial intelligence. • Discusses the application of machine learning models to learn linguistic characteristics of hate speech over social media platforms. • Emphasizes the role of multilingual and multimodal processing to detect fake news. • Includes research on different optimization techniques, case studies on the identification, prevention, and social impact of fake news, and GitHub repository links to aid understanding. The text is for professionals and scholars of various disciplines interested in fake news and hate speech detection.
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.