Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III: Communications in Computer and Information Science, cartea 1424
Editat de Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertinoen Limba Engleză Paperback – 29 iun 2021
Part I: artificial intelligence;
Part II: artificial intelligence; big data; cloud computing and security;
Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (6) | 642.57 lei 6-8 săpt. | |
| Springer International Publishing – 29 iun 2021 | 642.57 lei 6-8 săpt. | |
| Springer International Publishing – 29 iun 2021 | 642.70 lei 6-8 săpt. | |
| Springer International Publishing – 29 iun 2021 | 643.33 lei 6-8 săpt. | |
| Springer International Publishing – 13 iun 2022 | 750.69 lei 6-8 săpt. | |
| Springer International Publishing – 13 iun 2022 | 751.00 lei 6-8 săpt. | |
| Springer International Publishing – 13 iun 2022 | 806.32 lei 6-8 săpt. |
Din seria Communications in Computer and Information Science
- 20%
Preț: 460.54 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.30 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.73 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 321.81 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.54 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.98 lei - 20%
Preț: 388.26 lei - 20%
Preț: 318.67 lei - 20%
Preț: 389.14 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.73 lei - 20%
Preț: 530.40 lei - 20%
Preț: 388.00 lei - 20%
Preț: 632.09 lei - 20%
Preț: 388.91 lei - 20%
Preț: 310.73 lei
Preț: 643.33 lei
Preț vechi: 804.17 lei
-20% Nou
Puncte Express: 965
Preț estimativ în valută:
113.82€ • 132.60$ • 99.40£
113.82€ • 132.60$ • 99.40£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030786205
ISBN-10: 303078620X
Pagini: 758
Ilustrații: XVIII, 758 p. 330 illus., 206 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Cham, Switzerland
ISBN-10: 303078620X
Pagini: 758
Ilustrații: XVIII, 758 p. 330 illus., 206 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.07 kg
Ediția:1st ed. 2021
Editura: Springer International Publishing
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Cham, Switzerland
Cuprins
Cloud Computing and Security.- Design and Implementation of Information Detection System Based On Privacy Sensitive Data.- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform.- A Method of network attack recognition Based on CNN+LSTM Model.- Encryption and Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing.- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables.- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal.- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature extracting and matching system based on magic-number and AC-algorithm.- A Review: How to detect malicious domains.- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in Smart Contracts: A Survey.- Detection of false data injection attacks in Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method Based on Image Low-frequency Information.- Information Hiding.- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network.- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm.- Finding the better distortion function from prior scheme for Image Steganography.- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning.- Color Image Steganography Scheme Based on Convolutional Neural Network.- Robust JPEG steganography using singular value decomposition in DCT domain.- 3D Coverless Image SteganographyScheme Based on 3D Slice Technology.- Software Information Hiding Algorithm Based on Import Table of Portable Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG Compression.- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT Security.- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis.- A Comprehensive Review of IoT Technologies and Applications for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting.- ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing Satellite Internet of Things by Perceiving Content Semantics.- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear Time-invariant System Reduced-order Finite-time Observer.- Research on invulnerability of WSN based on small world characteristics of complex networks.- Collaboration energy efficiency with mobile edge computing for target tracking in IOT.- Realization of CSI-based Human Behavior Recognition: A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example.- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology.- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG Image Steganography Based onSVD in Wavelet Domain.- Raw Material Traceability of Industrial Control System based on Blockchain.- Survey: Research on Blockchain Consensus Mechanism in IoT Security.- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm.- Optimization of Location Technology in Meteorological Wireless Sensor Network.- A Survey on the Applications of Wi-Fi Sensing.- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health.- A Novel Hand Gesture Recognition Method for FMCW Radar.- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection.- A Practical Blockchain Framework for Securing IoT Applications.- A Blockchain-based Internet of Things Forensics Model.- Network Device Identification based on MAC Boundary Inference.- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research.- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment.- A Caching Strategy Based On Content Popularity Level for NDN.