|
Showing 1 - 19 of
19 matches in All Departments
The Second International Conference on Innovations in Computing
Research (ICR’23) brings together a diverse group of researchers
from all over the world with the intent of fostering collaboration
and dissemination of the innovations in computing technologies. The
conference is aptly segmented into six tracks: Data Science,
Computer and Network Security, Health Informatics and Medical
Imaging, Computer Science and Computer Engineering Education,
Internet of Things, and Smart Cities/Smart Energy. These tracks aim
to promote a birds-of-the-same-feather congregation and maximize
participation. The Data Science track covers a wide range of topics
including complexity score for missing data, deep learning and fake
news, cyberbullying and hate speech, surface area estimation,
analysis of gambling data, car accidents predication model,
augmenting character designers’ creativity, deep learning for
road safety, effect of sleep disturbances on the quality of sleep,
deep learning-based path-planning, vehicle data collection and
analysis, predicting future stocks prices, and trading robot for
foreign exchange. Computer and Network Security track is dedicated
to various areas of cybersecurity. Among these are decentralized
solution for secure management of IoT access rights, multi-factor
authentication as a service (MFAaaS) for federated cloud
environments, user attitude toward personal data privacy and data
privacy economy, host IP obfuscation and performance analysis, and
vehicle OBD-II port countermeasures. The Computer Science
and Engineering Education track enfolds various educational areas,
such as data management in industry–academia joint research: a
perspective of conflicts and coordination in Japan, security
culture and security education, training and awareness (SETA),
influencing information security management, engaging undergraduate
students in developing graphical user interfaces for NSF funded
research project, and emotional intelligence of computer science
teachers in higher education. On the Internet of Things (IoT)
track, the focus is on industrial air quality sensor visual
analytics, social spider optimization meta-heuristic for node
localization optimization in wireless sensor networks, and privacy
aware IoT-based fall detection with infrared sensors and deep
learning. The Smart Cities and Smart Energy track spans various
areas, which include, among others, research topics on
heterogeneous transfer learning in structural health monitoring for
high-rise structures and energy routing in energy Internet using
the firefly algorithm.
This book includes recent research on Data Science, IoT, Smart
Cities and Smart Energy, Health Informatics, and Network Security.
The International Conference on Advances in Computing Research
(ACR’23) brings together a diverse group of researchers from all
over the world with the intent of fostering collaboration and
dissemination of the advances in computing technologies. The
conference is aptly segmented into six tracks to promote a
birds-of-the-same-feather congregation and maximize participation.
 The first track covers computational intelligence, which
include, among others, research topics on artificial intelligence,
knowledge representation and management, application and theory of
neural systems, fuzzy and expert systems, and genetic algorithms.
 The second track focuses on cybersecurity engineering. It
includes pertinent topics such as incident response, hardware and
network security, digital biometrics and forensics technologies,
and cybersecurity metrics and assessment. Further, it features
emerging security technologies and high-tech systems security. The
third track includes studies on data analytics. It covers topics
such as data management, statistical and deep analytics, semantics
and time series analytics, and a multitude of important
applications of data analytics in areas such as engineering, health
care, business, and manufacturing. Â The fourth track on
network and communications covers a wide range of topics in both
areas including protocols and operations, ubiquitous networks, ad
hoc and sensor networks, cellular systems, virtual and augmented
reality streaming, information centric networks, and the emerging
areas in connected and autonomous vehicle communications. Â
Lastly, the final track on cloud and mobile computing includes
areas of interest in cloud computing such as infrastructure,
service, management and operations, architecture, and
interoperability and federation. This track also includes important
topics in mobile computing such as services and
applications, communication architectures, positioning
and tracking technologies, the general applications of mobile
computing.Â
|
Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Paperback, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
|
R7,986
Discovery Miles 79 860
|
Ships in 10 - 15 working days
|
The book presents the proceedings of four conferences: The 19th
International Conference on Security & Management (SAM'20), The
19th International Conference on Wireless Networks (ICWN'20), The
21st International Conference on Internet Computing & Internet
of Things (ICOMP'20), and The 18th International Conference on
Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences
took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences
are part of the larger 2020 World Congress in Computer Science,
Computer Engineering, & Applied Computing (CSCE'20), which
features 20 major tracks. Authors include academics, researchers,
professionals, and students. Presents the proceedings of four
conferences as part of the 2020 World Congress in Computer Science,
Computer Engineering, & Applied Computing (CSCE'20); Includes
the tracks on security & management, wireless networks,
internet computing and IoT, and embedded systems as well as
cyber-physical systems; Features papers from SAM'20, ICWN'20,
ICOMP'20 and ESCS'20.
|
Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Hardcover, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
|
R8,018
Discovery Miles 80 180
|
Ships in 10 - 15 working days
|
The book presents the proceedings of four conferences: The 19th
International Conference on Security & Management (SAM'20), The
19th International Conference on Wireless Networks (ICWN'20), The
21st International Conference on Internet Computing & Internet
of Things (ICOMP'20), and The 18th International Conference on
Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences
took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences
are part of the larger 2020 World Congress in Computer Science,
Computer Engineering, & Applied Computing (CSCE'20), which
features 20 major tracks. Authors include academics, researchers,
professionals, and students. Presents the proceedings of four
conferences as part of the 2020 World Congress in Computer Science,
Computer Engineering, & Applied Computing (CSCE'20); Includes
the tracks on security & management, wireless networks,
internet computing and IoT, and embedded systems as well as
cyber-physical systems; Features papers from SAM'20, ICWN'20,
ICOMP'20 and ESCS'20.
This book provides readers with a thorough understanding of various
research areas within the field of data science. The book
introduces readers to various techniques for data acquisition,
extraction, and cleaning, data summarizing and modeling, data
analysis and communication techniques, data science tools, deep
learning, and various data science applications. Researchers can
extract and conclude various future ideas and topics that could
result in potential publications or thesis. Furthermore, this book
contributes to Data Scientists' preparation and to enhancing their
knowledge of the field. The book provides a rich collection of
manuscripts in highly regarded data science topics, edited by
professors with long experience in the field of data science.
Introduces various techniques, methods, and algorithms adopted by
Data Science experts Provides a detailed explanation of data
science perceptions, reinforced by practical examples Presents a
road map of future trends suitable for innovative data science
research and practice
This book concentrates on a wide range of advances related to IT
cybersecurity management. The topics covered in this book include,
among others, management techniques in security, IT risk
management, the impact of technologies and techniques on security
management, regulatory techniques and issues, surveillance
technologies, security policies, security for protocol management,
location management, GOS management, resource management, channel
management, and mobility management. The authors also discuss
digital contents copyright protection, system security management,
network security management, security management in network
equipment, storage area networks (SAN) management, information
security management, government security policy, web penetration
testing, security operations, and vulnerabilities management. The
authors introduce the concepts, techniques, methods, approaches and
trends needed by cybersecurity management specialists and educators
for keeping current their cybersecurity management knowledge.
Further, they provide a glimpse of future directions where
cybersecurity management techniques, policies, applications, and
theories are headed. The book is a rich collection of carefully
selected and reviewed manuscripts written by diverse cybersecurity
management experts in the listed fields and edited by prominent
cybersecurity management researchers and specialists.
This book focuses on a wide range of innovations related to
Cybersecurity Education which include: curriculum development,
faculty and professional development, laboratory enhancements,
community outreach, and student learning. The book includes topics
such as: Network Security, Biometric Security, Data Security,
Operating Systems Security, Security Countermeasures, Database
Security, Cloud Computing Security, Industrial Control and Embedded
Systems Security, Cryptography, and Hardware and Supply Chain
Security. The book introduces the concepts, techniques, methods,
approaches and trends needed by cybersecurity specialists and
educators for keeping current their security knowledge. Further, it
provides a glimpse of future directions where cybersecurity
techniques, policies, applications, and theories are headed. The
book is a rich collection of carefully selected and reviewed
manuscripts written by diverse cybersecurity experts in the listed
fields and edited by prominent cybersecurity researchers and
specialists.
This book provides readers with a thorough understanding of various
research areas within the field of data science. The book
introduces readers to various techniques for data acquisition,
extraction, and cleaning, data summarizing and modeling, data
analysis and communication techniques, data science tools, deep
learning, and various data science applications. Researchers can
extract and conclude various future ideas and topics that could
result in potential publications or thesis. Furthermore, this book
contributes to Data Scientists' preparation and to enhancing their
knowledge of the field. The book provides a rich collection of
manuscripts in highly regarded data science topics, edited by
professors with long experience in the field of data science.
Introduces various techniques, methods, and algorithms adopted by
Data Science experts Provides a detailed explanation of data
science perceptions, reinforced by practical examples Presents a
road map of future trends suitable for innovative data science
research and practice
This book introduces readers to the tools needed to protect IT
resources and communicate with security specialists when there is a
security problem. The book covers a wide range of security topics
including Cryptographic Technologies, Network Security, Security
Management, Information Assurance, Security Applications, Computer
Security, Hardware Security, and Biometrics and Forensics. It
introduces the concepts, techniques, methods, approaches, and
trends needed by security specialists to improve their security
skills and capabilities. Further, it provides a glimpse into future
directions where security techniques, policies, applications, and
theories are headed. The book represents a collection of carefully
selected and reviewed chapters written by diverse security experts
in the listed fields and edited by prominent security researchers.
Complementary slides are available for download on the book's
website at Springer.com.
This book introduces readers to the tools needed to protect IT
resources and communicate with security specialists when there is a
security problem. The book covers a wide range of security topics
including Cryptographic Technologies, Network Security, Security
Management, Information Assurance, Security Applications, Computer
Security, Hardware Security, and Biometrics and Forensics. It
introduces the concepts, techniques, methods, approaches, and
trends needed by security specialists to improve their security
skills and capabilities. Further, it provides a glimpse into future
directions where security techniques, policies, applications, and
theories are headed. The book represents a collection of carefully
selected and reviewed chapters written by diverse security experts
in the listed fields and edited by prominent security researchers.
Complementary slides are available for download on the book's
website at Springer.com.
This book provides an essential compilation of relevant and cutting
edge academic and industry work on key Blockchain topics. This book
concentrates on a wide range of advances related to Blockchains
which include, among others, Blockchain principles, architecture
and concepts with emphasis on key and innovative theories,
methodologies, schemes and technologies of Blockchain, Blockchain
platforms and architecture, Blockchain protocols, sensors and
devices for Blockchain, Blockchain foundations, and reliability
analysis of Blockchain-based systems. Further, it provides a
glimpse of future directions where cybersecurity applications are
headed. The book is a rich collection of carefully selected and
reviewed manuscripts written by diverse cybersecurity application
experts in the listed fields and edited by prominent cybersecurity
applications researchers and specialists.
This book provides an essential compilation of relevant and cutting
edge academic and industry work on key cybersecurity applications
topics. Further, it introduces cybersecurity applications to the
public at large to develop their cybersecurity applications
knowledge and awareness. The book concentrates on a wide range of
advances related to Cybersecurity Applications which include, among
others, applications in the areas of Data Science, Internet of
Things, Artificial Intelligence, Robotics, Web, High-Tech Systems,
Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud
Computing. It introduces the concepts, techniques, methods,
approaches and trends needed by cybersecurity application
specialists and educators for keeping current their cybersecurity
applications knowledge. Further, it provides a glimpse of future
directions where cybersecurity applications are headed. The book
can be a valuable resource to applied cybersecurity experts towards
their professional development efforts and to students as a
supplement to their cybersecurity courses.
This book focuses on a wide range of breakthroughs related to
digital biometrics and forensics. The authors introduce the
concepts, techniques, methods, approaches and trends needed by
cybersecurity specialists and educators for keeping current their
biometrics and forensics knowledge. Furthermore, the book provides
a glimpse of future directions where biometrics and forensics
techniques, policies, applications, and theories are headed. Topics
include multimodal biometrics, soft biometrics, mobile biometrics,
vehicle biometrics, vehicle forensics, integrity verification of
digital content, people identification, biometric-based cybercrime
investigation, among others. The book is a rich collection of
carefully selected and reviewed manuscripts written by diverse
digital biometrics and forensics experts in the listed fields and
edited by prominent biometrics and forensics researchers and
specialists.
This book, Proceedings of the ICR22 International Conference on
Innovations in Computing Research, provides an essential
compilation of relevant and cutting-edge academic and industry work
on key computer and network security, smart cities, smart energy,
IoT, health informatics, biomedical imaging, data science and
computer science and engineering education topics. It offers an
excellent professional development resource for educators and
practitioners on the state-of-the-art in these areas and
contributes towards the enhancement of the community outreach and
engagement component of the above-mentioned areas. Various
techniques, methods, and approaches adopted by experts in these
fields are introduced. This book provides detailed explanation of
the concepts that are pertinently reinforced by practical examples,
and a road map of future trends that are suitable for innovative
computing research. It is written by professors, researchers, and
industry professionals with long experience in these fields to
furnish a rich collection of manuscripts in highly regarded topics
that have not been creatively compiled together before. This book
can be a valuable resource to university faculty, students to
enhance their research work and as a supplement to their courses in
these fields, researchers, and industry professionals. Furthermore,
it is a valuable tool to experts in these areas to contribute
towards their professional development efforts.
This book concentrates on a wide range of advances related to IT
cybersecurity management. The topics covered in this book include,
among others, management techniques in security, IT risk
management, the impact of technologies and techniques on security
management, regulatory techniques and issues, surveillance
technologies, security policies, security for protocol management,
location management, GOS management, resource management, channel
management, and mobility management. The authors also discuss
digital contents copyright protection, system security management,
network security management, security management in network
equipment, storage area networks (SAN) management, information
security management, government security policy, web penetration
testing, security operations, and vulnerabilities management. The
authors introduce the concepts, techniques, methods, approaches and
trends needed by cybersecurity management specialists and educators
for keeping current their cybersecurity management knowledge.
Further, they provide a glimpse of future directions where
cybersecurity management techniques, policies, applications, and
theories are headed. The book is a rich collection of carefully
selected and reviewed manuscripts written by diverse cybersecurity
management experts in the listed fields and edited by prominent
cybersecurity management researchers and specialists.
This volume contains the proceedings of the 2017 International
Conference on Security and Management (SAM'17).
Proceedings of the 2019 International Conference on Security and
Management held July 29th - August 1st, 2019 in Las Vegas, Nevada.
|
Security and Management (Paperback)
Kevin Daimi, Hamid R Arabnia, Michael R. Grimaila, Kathy Liszka, George Markowsky, …
|
R1,743
R1,605
Discovery Miles 16 050
Save R138 (8%)
|
Ships in 12 - 17 working days
|
Security and Management is a compendium of articles and papers that
were presented at SAM '13, an international conference that serves
researchers, scholars, professionals, students, and academicians.
Selected topics include: Security Management, Security Education,
and Hardware Security Biometric And Forensics Computer Security
Information Assurance Cryptographic Technologies Systems
Engineering and Security Computer and Network Security Network
Security Cybersecurity Education Cryptography + Malware and Spam
Detection + Network Security and Cyber Security Education
|
Security and Management (Paperback)
Kevin Daimi, Hamid R Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, …
|
R2,826
R2,548
Discovery Miles 25 480
Save R278 (10%)
|
Ships in 12 - 17 working days
|
Security and Management is a compendium of articles and papers that
were presented at SAM '14, an international conference that serves
researchers, scholars, professionals, students, and academicians.
Selected topics include: Security Management, Security Education,
and Hardware Security Biometric And Forensics Computer Security
Information Assurance Cryptographic Technologies Systems
Engineering and Security Computer and Network Security Network
Security Cybersecurity Education Cryptography + Malware and Spam
Detection + Network Security and Cyber Security Education
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|