Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II: Lecture Notes in Computer Science, cartea 12737
Editat de Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertinoen Limba Engleză Paperback – 12 iun 2021
Part I: Artificial intelligence; and big data
Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (5) | 356.13 lei 6-8 săpt. | |
Springer International Publishing – 12 iun 2021 | 356.13 lei 6-8 săpt. | |
Springer International Publishing – 8 iun 2022 | 665.75 lei 6-8 săpt. | |
Springer International Publishing – 12 iun 2021 | 669.21 lei 6-8 săpt. | |
Springer International Publishing – 8 iun 2022 | 724.14 lei 6-8 săpt. | |
Springer International Publishing – 8 iun 2022 | 724.80 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 356.13 lei
Preț vechi: 445.16 lei
-20% Nou
Puncte Express: 534
Preț estimativ în valută:
68.15€ • 71.06$ • 56.64£
68.15€ • 71.06$ • 56.64£
Carte tipărită la comandă
Livrare economică 20 martie-03 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030786113
ISBN-10: 3030786110
Pagini: 753
Ilustrații: XXIII, 753 p. 353 illus., 246 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
ISBN-10: 3030786110
Pagini: 753
Ilustrații: XXIII, 753 p. 353 illus., 246 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Information Systems and Applications, incl. Internet/Web, and HCI
Locul publicării:Cham, Switzerland
Cuprins
Big Data.- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform.- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis.- Exploring the informationization of Land Reserve Archives Management.- Research and Implementation of Anomaly Detection Algorithm in Data Mining.- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction.- Design and Implementation of Data Adapter in SWIM.- Cloud Computing and Security.- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking.- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing.- A Computing Task Offloading Scheme for Mobile Edge Computing.- Security Transmission Scheme of Sensitive Data for Mobile Terminal.- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain.- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring.- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network.- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature.- Detection of Virtual Machines based on Thread Scheduling.- Graph Attention Network for Word Embeddings.- Firewall Filtering Technology And Application Based On Decision Tree.- Encryption and Cybersecurity.- A DAPP business data storage model based on blockchain and IPFS.- IPv6-Darknet Network Traffic Detection.- Neural Control Based Research of Endogenous Security Model.- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes.- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy.- A transaction model of bill service based on blockchain.- An N-gram Based Deep Learning Method for Network Traffic Classification.- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning.- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture.- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain.- Information Hiding.- Covert Communication via Modulating Soft Label of Neural Network.- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography.- Halftone Image Steganography Based on Reassigned Distortion Measurement.- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units.- High efficiency quantum image steganography protocol based on ZZW framework.- Halftone Image Steganalysis by Reconstructing Grayscale Image.- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition.- Research and Implementation of Medical Information Protection and Sharing based on Blockchain.- IoT Security.- LoRa Network Security Schemes Based on RF Fingerprint.- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living.- Blockchain-based reliable collection mechanism for smart meter quality data.- Power Blockchain Guarantee Mechanism Based on Trusted Computing.- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol.- Sensor Failure Detection Based on Programmable Switch and Machine Learning.- A Solution to Reduce Broadcast Storm in VANET.- a Vehicle Intrusion Detection System Based on Time Interval and Data Field.- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption.- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections.- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA.- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments.- Security analysis of measurement automation system based on threat intelligence.- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network.- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning.- Recent Development, Trends and Challenges in IoT Security.- Energy Optimization for Wild Animal Tracker basing on watchdog technology.- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction.- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength.- Wi-Fi Indoor Positioning Using D-S Evidence Theory.- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System.- Multimedia Forensics.- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain.- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method.- A Fast Tongue Image Color Correction Method Based on Gray World Method.- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval.