• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

ISBN-13: 9789819902712 / Angielski / Miękka / 2023 / 549 str.

Guojun Wang; Kim-Kwang Raymond Choo; Jie Wu
Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers Guojun Wang Kim-Kwang Raymond Choo Jie Wu 9789819902712 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

ISBN-13: 9789819902712 / Angielski / Miękka / 2023 / 549 str.

Guojun Wang; Kim-Kwang Raymond Choo; Jie Wu
cena 403,47 zł
(netto: 384,26 VAT:  5%)

Najniższa cena z 30 dni: 385,52 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022.


The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Data Science - General
Computers > Artificial Intelligence - General
Computers > Security - General
Wydawca:
Springer
Seria wydawnicza:
Communications in Computer and Information Science
Język:
Angielski
ISBN-13:
9789819902712
Rok wydania:
2023
Wydanie:
2023
Numer serii:
000354756
Ilość stron:
549
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

​Cyberspace Security.- Support Tool Selection in Digital Forensics Training.- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.- A Hybrid Secure Two-party Protocol for Vertical Federated Learning.- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM.- CATS: A serious game in industry towards stronger cloud security.- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.- Vulnerability Detection with Representation Learning.- Assessing Vulnerability from Its Description.- Malware Traffic Classification Based on GAN and BP Neural Networks.- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications.- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection.- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning.- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety.- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA).- Android Malware Detection: A Literature Review.- Threat Modeling in Cloud Computing - A Literature Review.- A New Signal Packing Algorithm for CAN-FD with Security Consideration.- An Adversarial Sample Defense Method based on Saliency Information.- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning.- Cyberspace Privacy.- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis.- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing.- Encryption Proxies in a Confidential Computing Environment.- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.- Differentially Private Clustering Algorithm for Mixed Data.- Impact Of Reenactment Programs on Young Generation.- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning.- Cyberspace Anonymity.- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization.- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates.- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things.- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud.- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems.- Short Papers.- Garbage recognition algorithm based on self-attention mechanism and deep sorting.- Approaches for Zero Trust Adoption Based Upon Organization Security Level.- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia