Atnaujinkite slapukų nuostatas

El. knyga: Intelligent Systems Design and Applications: Information and Network Security, Volume 3

Edited by , Edited by , Edited by , Edited by
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security.

Misdirection attack in wireless sensor network using  threshold method.-
Blockchain for data traceability in the agricultural sector.- Detection of
fake URLs using deep LSTM architecture over Social Media.- Leveraging
Blockchain for Secure Water Meter Reading.- A Hybrid
Differential-Evolution-based approach to the sensor network localisation
problem.- A Review on Physical Abuse Detection Techniques using Video
Surveillance Systems.- Detection of Suspicious Activities at Hypervisor in
Cloud Computing A Brief Study.- A Simple Genetic Algorithm for the Maximum
Min Sum Dispersion Problem  Max MinSum DP and New Node Similarity based
Variants.- Towards Analysis of Threat Modeling of Software Systems According
to Key Criteria.- Deepfake Detection System for Facial Evidence Verification
in Criminal Justice and its Legal and Ethical Implications.- A methodology to
evaluate the security of block ciphers against neurocryptanalytic attacks.