• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV

ISBN-13: 9783030242671 / Angielski / Miękka / 2019 / 651 str.

Xingming Sun; Zhaoqing Pan; Elisa Bertino
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV Sun, Xingming 9783030242671 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV

ISBN-13: 9783030242671 / Angielski / Miękka / 2019 / 651 str.

Xingming Sun; Zhaoqing Pan; Elisa Bertino
cena 201,72
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - Cryptography & Encryption
Computers > Networking - Hardware
Computers > Information Technology
Wydawca:
Springer
Język:
Angielski
ISBN-13:
9783030242671
Rok wydania:
2019
Dostępne języki:
Ilość stron:
651
Waga:
0.92 kg
Wymiary:
23.39 x 15.6 x 3.43
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Encryption and Cybersecurity.- A Gray-Box Vulnerability Discovery Model based on Path Coverage.- Quantum Network Coding Based on Entanglement Distribution.- Moving Target Defense in Preventing SQL Injection.- Design and Security Analysis of Certificateless Aggregate Signature Scheme.- SuperEye: a Distributed Port Scanning System.- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data.- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis.- Short Text Topic Recognition and Optimization Method for University Online Community.- A Survey on Network Traffic Identification.- A Survey of Network Security Situational Awareness Technology.- Multi-function Quantum Cryptography Protocol Based On Bell State.- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis.- A Weight-Based Channel Estimation Implementation Algorithm.- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function.- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme.- Robust Analysis of Grid System Based on Complex Network Attack Mode.- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE.- Research on SQL Injection and Defense Technology.- A Review of the Factorization Problem of Large Integers.- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks.- A Survey of Privacy-Preserving Techniques for Blockchain.- A Survey of Software Reverse Engineering Applications.- A Fast IP Matching Algorithm under Large Traffic.- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers.- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric.- Research on Content Extraction of Rich Text Web Pages.- Network Protocol Analysis base on WeChat PC Version.- Bitcoin Network Size Estimation Based on Coupon Collection Model.- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques.- A Distributed Cryptanalysis Framework based on Mobile Phones.- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier.- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network.- Fast Failover for Link Failures in Software Defined Networks.- Steady-state Topology Discovery of Target Networks based on Statistics Method.- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels.- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn.- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory.- Webshell Detection Model based on Deep Learning.- A Security-Sensitive Function Mining Framework for Source Code.- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net.- Trusted Component Decomposition Based on OR-transition Colored Petri Net.- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range.- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning.- Identify Influentials Based on User behavior Across Different Topics.- Taylor Series Localization Algorithm Based on Semi-definite Programming.- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene.- An evolving network model based on a triangular connecting mechanism for the Internet topology.- A new quantum private query protocol with better performance in resisting joint-measurement attack.- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid.- Blockchain Private Key Storage Algorithm Based on Image Information Hiding.- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning.- JPEGCNN A Transform Domain Steganalysis Model Based On Convolutional Neural Network.- Quantum algorithm for support vector machine with exponentially improved dependence on precision.- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid.- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain.- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks.- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis.- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia