You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
These proceedings gather contributions presented at the 4th International Conference on Applied Operational Research (ICAOR 2012) in Bangkok, Thailand, July 25-27, 2012, published in the series Lecture Notes in Management Science (LNMS). The conference covers all aspects of Operational Research and Management Science (OR/MS) with a particular emphasis on applications.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
This proceedings volume highlights the state-of-the-art knowledge related to optimization, decisions science and problem solving methods, as well as their application in industrial and territorial systems. It includes contributions tackling these themes using models and methods based on continuous and discrete optimization, network optimization, simulation and system dynamics, heuristics, metaheuristics, artificial intelligence, analytics, and also multiple-criteria decision making. The number and the increasing size of the problems arising in real life require mathematical models and solution methods adequate to their complexity. There has also been increasing research interest in Big Data ...
Overview In this diploma course you will deal with the most important strategies and techniques in cyber security. Content - The Modern Strategies in the Cyber Warfare - Cyber Capabilities in Modern Warfare - Developing Political Response Framework to Cyber Hostilities - Cyber Security Strategy Implementation - Cyber Deterrence Theory and Practice - Data Stream Clustering for Application Layer DDos Detection in Encrypted Traffic - Domain Generation Algorithm Detection Using Machine Learning Methods - New Technologies in Password Cracking Techniques - Stopping Injection Attacks with Code and Structured Data - Cyber Security Cryptography and Machine Learning - Cyber Risk - And more Duration 3 months Assessment The assessment will take place on the basis of one assignment at the end of the course. Tell us when you feel ready to take the exam and we’ll send you the assignment questions. Study material The study material will be provided in separate files by email / download link.
This book constitutes the refereed proceedings of the 6th International Conference on Cryptology in India, INDOCRYPT 2005, held in Bangalore, India in December 2005. The 31 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on sequences, boolean function and S-box, hash functions, design principles, cryptanalysis, time memory trade-off, new constructions, pairings, signatures, applications, e-cash, and implementations.
This book constitutes the refereed proceedings of the 9th International Colloquium on Theoretical Aspects of Computing, ICTAC 2012 held in Bangalore, India, in September 2012. The 16 revised full papers presented together with the abstracts of three keynote talks were carefully reviewed and selected from 73 submissions. The papers cover various topics related to both theoretical aspects of computing and the exploitation of theory through methods and tools for system development.
This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc
Overview This course deals with everything you need to know to become a successful IT Consultant. Content - Business Process Management - Human Resource Management - IT Manager's Handbook - Principles of Marketing - The Leadership - Information Systems and Information Technology - IT Project Management Duration 12 months Assessment The assessment will take place on the basis of one assignment at the end of the course. Tell us when you feel ready to take the exam and we’ll send you the assignment questions. Study material The study material will be provided in separate files by email / download link.
This book constitutes the refereed proceedings of the 21st Annual Symposium on Theoretical Aspects of Computer Science, STACS 2004, held in Montpellier, France, in March 2004. The 54 revised full papers presented together with two invited contributions were carefully reviewed and selected from more than 200 submissions. The papers are organized in topical sections on structural complexity, graph algorithms, quantum computing, satisfiability - constraint satisfaction problems, scheduling, algorithms, networks, automata theory and words, path algorithms, cryptography, logic and formal languages, game theory and complexity, and algorithmic information.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.