|
Showing 1 - 5 of
5 matches in All Departments
This book presents the proceedings of The 2020 International
Conference on Machine Learning and Big Data Analytics for IoT
Security and Privacy (SPIoT-2020), held in Shanghai, China, on
November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020
conference was held online by Tencent Meeting. It provides
comprehensive coverage of the latest advances and trends in
information technology, science and engineering, addressing a
number of broad themes, including novel machine learning and big
data analytics methods for IoT security, data mining and
statistical modelling for the secure IoT and machine learning-based
security detecting protocols, which inspire the development of IoT
security and privacy technologies. The contributions cover a wide
range of topics: analytics and machine learning applications to IoT
security; data-based metrics and risk assessment approaches for
IoT; data confidentiality and privacy in IoT; and authentication
and access control for data usage in IoT. Outlining promising
future research directions, the book is a valuable resource for
students, researchers and professionals and provides a useful
reference guide for newcomers to the IoT security and privacy
field.
This book presents the proceedings of The 2020 International
Conference on Machine Learning and Big Data Analytics for IoT
Security and Privacy (SPIoT-2020), held in Shanghai, China, on
November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020
conference was held online by Tencent Meeting. It provides
comprehensive coverage of the latest advances and trends in
information technology, science and engineering, addressing a
number of broad themes, including novel machine learning and big
data analytics methods for IoT security, data mining and
statistical modelling for the secure IoT and machine learning-based
security detecting protocols, which inspire the development of IoT
security and privacy technologies. The contributions cover a wide
range of topics: analytics and machine learning applications to IoT
security; data-based metrics and risk assessment approaches for
IoT; data confidentiality and privacy in IoT; and authentication
and access control for data usage in IoT. Outlining promising
future research directions, the book is a valuable resource for
students, researchers and professionals and provides a useful
reference guide for newcomers to the IoT security and privacy
field.
This book presents the proceedings of the 2020 2nd International
Conference on Machine Learning and Big Data Analytics for IoT
Security and Privacy (SPIoT-2021), online conference, on 30 October
2021. It provides comprehensive coverage of the latest advances and
trends in information technology, science and engineering,
addressing a number of broad themes, including novel machine
learning and big data analytics methods for IoT security, data
mining and statistical modelling for the secure IoT and machine
learning-based security detecting protocols, which inspire the
development of IoT security and privacy technologies. The
contributions cover a wide range of topics: analytics and machine
learning applications to IoT security; data-based metrics and risk
assessment approaches for IoT; data confidentiality and privacy in
IoT; and authentication and access control for data usage in IoT.
Outlining promising future research directions, the book is a
valuable resource for students, researchers and professionals and
provides a useful reference guide for newcomers to the IoT security
and privacy field.
This book presents the proceedings of the 2020 2nd International
Conference on Machine Learning and Big Data Analytics for IoT
Security and Privacy (SPIoT-2021), online conference, on 30 October
2021. It provides comprehensive coverage of the latest advances and
trends in information technology, science and engineering,
addressing a number of broad themes, including novel machine
learning and big data analytics methods for IoT security, data
mining and statistical modelling for the secure IoT and machine
learning-based security detecting protocols, which inspire the
development of IoT security and privacy technologies. The
contributions cover a wide range of topics: analytics and machine
learning applications to IoT security; data-based metrics and risk
assessment approaches for IoT; data confidentiality and privacy in
IoT; and authentication and access control for data usage in IoT.
Outlining promising future research directions, the book is a
valuable resource for students, researchers and professionals and
provides a useful reference guide for newcomers to the IoT security
and privacy field.
This comprehensive study examines the global strategies of
multinational corporations (MNCs), the strategic evolution and the
categories of their subsidiaries in China based on 150 MNCs. It is
the first large-scale project of this nature to be conducted. The
research has significant bearing on strategic planning for firms
that have set up, are setting up or are planning to establish
subsidiaries in China, and the firms that try to compete in the
global marketplace. The findings are significant for the West,
owing to the current economic crisis and the need to determine if
subsidiary expansion strategies will help Western firms achieve the
portfolio effects in operations and avoid the harmful impact of
macro events such as the existing global financial crisis.
Additional empirical findings, analysis, discussions, and
suggestions for future studies are also presented.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Shelf Love
Yotam Ottolenghi, Noor Murad, …
Paperback
R595
R513
Discovery Miles 5 130
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|