You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book presents papers from the 7th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2022). The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on addressing the current challenges in the field. This book discusses key issues and highlights recent advances in a single broad topic applicable to different sub-fields by exploring various multidisciplinary technologies. This book supports the transfer of vital knowledge to next-generation researchers, students, and practitioners in academia and industry.
This book constitutes the proceedings of the 5th International Conference, CPC 2010, held in Hualien, Taiwan in May 2010. The 67 full papers are carefully selected from 184 submissions and focus on topics such as cloud and Grid computing, peer-to-peer and pervasive computing, sensor and moile networks, service-oriented computing, resource management and scheduling, Grid and pervasive applications, semantic Grid and ontologies, mobile commerce and services.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications.
With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
This book constitutes the refereed proceedings of the 6th International Conference on Computer, Communication, and Signal Processing, ICCSP 2022, held in Chennai, India, in February 2022.* The 21 full and 2 short papers presented in this volume were carefully reviewed and selected from 111 submissions. The papers are categorized into topical sub-headings: artificial intelligence and machine learning; Cyber security; and internet of things. *The conference was held as a virtual event due to the COVID-19 pandemic.
The Proceedings of the International Conference on Information Engineering, Management and Security 2014 which happened at Christu Jyoti Institute of Technology.
Proceedings of the combined volumes of International Congress (IntCongress 2014) held at Holiday Inn Silom, Bangkok, Kingdom of Thailand between 19th November, 2014 and 21st November, 2014.
Cognitive Computing for Internet of Medical Things (IoMT) offers a complete assessment of the present scenario, role, challenges, technologies, and impact of IoMT-enabled smart healthcare systems. It contains chapters discussing various biomedical applications under the umbrella of the IoMT. Key Features Exploits the different prospects of cognitive computing techniques for the IoMT and smart healthcare applications Addresses the significance of IoMT and cognitive computing in the evolution of intelligent medical systems for biomedical applications Describes the different computing techniques of cognitive intelligent systems from a practical point of view: solving common life problems Explores the technologies and tools to utilize IoMT for the transformation and growth of healthcare systems Focuses on the economic, social, and environmental impact of IoMT-enabled smart healthcare systems This book is primarily aimed at graduates, researchers and academicians working in the area of development of the application of the of the application of the IoT in smart healthcare. Industry professionals will also find this book helpful.
This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of Big Data and Cloud Computing are identified and presented throughout the book, which is intended for researchers, scholars, students, software developers and practitioners working at the forefront in their field. This book acts as a platform for exchanging ideas, setting questions for discussion, and sharing the experience in Big Data and Cloud Computing domain.