Artificial Intelligence and Security: Lecture Notes in Computer Science, cartea 12737
Editat de Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertinoen Limba Engleză Paperback – 12 iun 2021
Part I: Artificial intelligence; and big data
Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (5) | 346.73 lei 6-8 săpt. | |
| Springer – 12 iun 2021 | 346.73 lei 6-8 săpt. | |
| Springer – 8 iun 2022 | 644.77 lei 6-8 săpt. | |
| Springer – 12 iun 2021 | 648.46 lei 6-8 săpt. | |
| Springer – 8 iun 2022 | 701.08 lei 6-8 săpt. | |
| Springer – 8 iun 2022 | 701.90 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 346.73 lei
Preț vechi: 433.41 lei
-20%
Puncte Express: 520
Preț estimativ în valută:
61.31€ • 70.31$ • 52.99£
61.31€ • 70.31$ • 52.99£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783030786113
ISBN-10: 3030786110
Pagini: 780
Ilustrații: XXIII, 753 p. 353 illus., 246 illus. in color.
Dimensiuni: 155 x 235 x 42 mm
Greutate: 1.16 kg
Ediția:1st edition 2021
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030786110
Pagini: 780
Ilustrații: XXIII, 753 p. 353 illus., 246 illus. in color.
Dimensiuni: 155 x 235 x 42 mm
Greutate: 1.16 kg
Ediția:1st edition 2021
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Big Data.- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform.- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis.- Exploring the informationization of Land Reserve Archives Management.- Research and Implementation of Anomaly Detection Algorithm in Data Mining.- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction.- Design and Implementation of Data Adapter in SWIM.- Cloud Computing and Security.- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking.- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing.- A Computing Task Offloading Scheme for Mobile Edge Computing.- Security Transmission Scheme of Sensitive Data for Mobile Terminal.- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain.- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring.- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network.- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature.- Detection of Virtual Machines based on Thread Scheduling.- Graph Attention Network for Word Embeddings.- Firewall Filtering Technology And Application Based On Decision Tree.- Encryption and Cybersecurity.- A DAPP business data storage model based on blockchain and IPFS.- IPv6-Darknet Network Traffic Detection.- Neural Control Based Research of Endogenous Security Model.- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes.- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy.- A transaction model of bill service based on blockchain.- An N-gram Based Deep Learning Method for Network Traffic Classification.- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning.- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture.- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain.- Information Hiding.- Covert Communication via Modulating Soft Label of Neural Network.- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography.- Halftone Image Steganography Based on Reassigned Distortion Measurement.- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units.- High efficiency quantum image steganography protocol based on ZZW framework.- Halftone Image Steganalysis by Reconstructing Grayscale Image.- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition.- Research and Implementation of Medical Information Protection and Sharing based on Blockchain.- IoT Security.- LoRa Network Security Schemes Based on RF Fingerprint.- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living.- Blockchain-based reliable collection mechanism for smart meter quality data.- Power Blockchain Guarantee Mechanism Based on Trusted Computing.- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol.- Sensor Failure Detection Based on Programmable Switch and Machine Learning.- A Solution to Reduce Broadcast Storm in VANET.- a Vehicle Intrusion Detection System Based on Time Interval and Data Field.- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption.- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections.- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA.- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments.- Security analysis of measurement automation system based on threat intelligence.- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network.- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning.- Recent Development, Trends and Challenges in IoT Security.- Energy Optimization for Wild Animal Tracker basing on watchdog technology.- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction.- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength.- Wi-Fi Indoor Positioning Using D-S Evidence Theory.- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System.- Multimedia Forensics.- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain.- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method.- A Fast Tongue Image Color Correction Method Based on Gray World Method.- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval.