You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication and Security, COMS2 2021, held in Gandhinagar, India, in February 2021. Due to the COVID-19 pandemic the conference was held virtually. The 19 full papers were thoroughly reveiwed and selected from 105 submissions. Papers are organised according to the topical sections on artificial intelligence and machine learning; networking and communications.
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
The book gathers high-quality research papers presented at the International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2017). It includes technical sections describing progress in the fields of advanced computing and intelligent engineering, and is primarily intended for postgraduate students and researchers working in Computer Science and Engineering. However, researchers working in Electronics will also find the book useful, as it addresses hardware technologies and next-gen communication technologies.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcement learning, pattern recognition and classification for networks, machine learning for network slicing optimization, 5G system, user behavior prediction, multimedia, IoT, security and protection, optimization and new innovative machine learning methods, performance analysis of machine learning algorithms, experimental evaluations of machine learning, data mining in heterogeneous networks, distributed and decentralized machine learning algorithms, intelligent cloud-support communications, ressource allocation, energy-aware communications, software de ned networks, cooperative networks, positioning and navigation systems, wireless communications, wireless sensor networks, underwater sensor networks.
The International Conference on Signals, Systems and Automation (ICSSA 2011) aims to spread awareness in the research and academic community regarding cutting-edge technological advancements revolutionizing the world. The main emphasis of this conference is on dissemination of information, experience, and research results on the current topics of interest through in-depth discussions and participation of researchers from all over the world. The objective is to provide a platform to scientists, research scholars, and industrialists for interacting and exchanging ideas in a number of research areas. This will facilitate communication among researchers in different fields of Electronics and Com...
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS). Features: A systematic overview of the state-of-the-art IDS Proper explanation of novel cyber attacks which are much different from classical cyber attacks Proper and in-depth discussion of AI in the field of cybersecurity Introduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementations Covers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks. This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security.
This book constitutes the refereed proceedings of the 10th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2010, held in conjunction with the Third Conference on Smart Spaces, ruSMART 2009 in St. Petersburg, Russia, in August 2010. The 27 revised NEW2AN full papers are organized in topical sections on performance evaluation; performance modeling; delay-/disruption-tolerant networking and overlay systems; integrated wireless networks; resource management; and multimedia communications. The 14 revised ruSMART full papers are about smart spaces use cases; smart-M3 platform; and smart spaces solutions.
This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
This book includes selected papers from the International Conference on Data Science and Intelligent Applications (ICDSIA 2020), hosted by Gandhinagar Institute of Technology (GIT), Gujarat, India, on January 24–25, 2020. The proceedings present original and high-quality contributions on theory and practice concerning emerging technologies in the areas of data science and intelligent applications. The conference provides a forum for researchers from academia and industry to present and share their ideas, views and results, while also helping them approach the challenges of technological advancements from different viewpoints. The contributions cover a broad range of topics, including: coll...