You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
This edited volume on machine learning and big data analytics (Proceedings of ICMLBDA 2022) is intended to be used as a reference book for researchers and professionals to share their research and reports of new technologies and applications in Machine Learning and Big Data Analytics like biometric Recognition Systems, medical diagnosis, industries, telecommunications, AI Petri Nets Model-Based Diagnosis, gaming, stock trading, Intelligent Aerospace Systems, robot control, law, remote sensing and scientific discovery agents and multiagent systems; and natural language and Web intelligence. The intent of this book is to provide awareness of algorithms used for machine learning and big data in the advanced Scientific Technologies, provide a correlation of multidisciplinary areas and become a point of great interest for Data Scientists, systems architects, developers, new researchers and graduate level students. This volume provides cutting-edge research from around the globe on this field. Current status, trends, future directions, opportunities, etc. are discussed, making it friendly for beginners and young researchers.
With the intriguing development of technologies in several industries along with the advent of accrescent and ubiquitous computational resources, it creates an ample number of opportunities to develop innovative intelligence technologies in order to solve the wide range of uncertainties, imprecision, and vagueness issues in various real-life problems. Hybridizing modern computational intelligence with traditional computing methods has attracted researchers and academicians to focus on developing innovative AI techniques using data science. International Conference on Data Science and Artificial Intelligence (ICDSAI) 2022, organized on April 23-24, 2022 by the Indian Institute of Technology, Patna at NITIE Mumbai (India) in collaboration with the International Association of Academicians (IAASSE) USA collected scientific and technical contributions with respect to models, tools, technologies, and applications in the field of modern Artificial Intelligence and Data Science, covering the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
This book presents recent advances on IoT and connected technologies. We are currently in the midst of the Fourth Industrial Revolution, and IoT is having the most significant impact on our society. The recent adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., has made the Internet of things (IoT) step out of its infancy. Internet of things (IoT) and connecting technologies are already having profound effects on the different parts of society like the government, health care, businesses, and personal lives. 6th International Conference on Internet of Thi...
This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. Th...
This book presents research in artificial techniques using intelligence for energy transition, outlining several applications including production systems, energy production, energy distribution, energy management, renewable energy production, cyber security, industry 4.0 and internet of things etc. The book goes beyond standard application by placing a specific focus on the use of AI techniques to address the challenges related to the different applications and topics of energy transition. The contributions are classified according to the market and actor interactions (service providers, manufacturers, customers, integrators, utilities etc.), to the SG architecture model (physical layer, infrastructure layer, and business layer), to the digital twin of SG (business model, operational model, fault/transient model, and asset model), and to the application domain (demand side management, load monitoring, micro grids, energy consulting (residents, utilities), energy saving, dynamic pricing revenue management and smart meters, etc.).