Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 20 of 20 matches in All Departments
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things. It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system. It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries. As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system; the Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. Addresses architecture and organization issues Examines the different types of routing attacks for WANs Explains how to ensure Quality of Service in secure routing Considers honesty and trust-based IDS solutions Explores emerging trends in WAN security Describes the blackhole attack detection technique Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# presents the important properties of neural networks while keeping the complex mathematics to a minimum. Explaining how to build and use neural networks, it presents complicated information about neural networks structure, functioning, and learning in a manner that is easy to understand.Taking a "learn by doing" approach, the book is filled with illustrations to guide you through the mystery of neural networks. Examples of experiments are provided in the text to encourage individual research. Online access to C# programs is also provided to help you discover the properties of neural networks.Following the procedures and using the programs included with the book will allow you to learn how to work with neural networks and evaluate your progress. You can download the programs as both executable applications and C# source code from http://home.agh.edu.pl/~tad//index.php?page=programyandlang=en
This book features extended versions of selected papers that were presented and discussed at the 7th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2020) held in Kolkata, India on February 28-29, 2020. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.
This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12-13 March, 2019. Organized by the Departments of Computer Science & Engineering and A.K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.
This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12-13 March, 2019. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.
The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India. The symposium was jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy; and the University of Calcutta, India. The book is divided into two volumes, Volumes 3 and 4, and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next-Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering. The first two volumes of the book published the works presented at the ACSS 2015, which was held from May 23 to 25, 2015 in Kolkata, India.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different sections. Section-A is on Pattern Recognition and it presents four chapters. Section B is on Imaging and Healthcare Applications contains four more book chapters. The section C of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Sections presenting a total of eleven chapters in it. Section D consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Section E in Volume II is on Cryptography with two book chapters in it. Section F of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different sections. Section-A is on "Pattern Recognition" and it presents four chapters. Section B is on "Imaging and Healthcare Applications" contains four more book chapters. The section C of this volume is on "Wireless Sensor Networking" and it includes as many as six chapters. Volume II of the book has three Sections presenting a total of eleven chapters in it. Section D consists of five excellent chapters on "Software Engineering "ranging from cloud service design to transactional memory. Section E in Volume II is on "Cryptography" with two book chapters in it. Section F of this volume is on "Computer Aided Design" with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations-making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical. Exploring Neural Networks with C# presents the important properties of neural networks-while keeping the complex mathematics to a minimum. Explaining how to build and use neural networks, it presents complicated information about neural networks structure, functioning, and learning in a manner that is easy to understand. Taking a "learn by doing" approach, the book is filled with illustrations to guide you through the mystery of neural networks. Examples of experiments are provided in the text to encourage individual research. Online access to C# programs is also provided to help you discover the properties of neural networks. Following the procedures and using the programs included with the book will allow you to learn how to work with neural networks and evaluate your progress. You can download the programs as both executable applications and C# source code from http://home.agh.edu.pl/~tad//index.php?page=programy&lang=en
This book constitutes the proceedings of the 18th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2019, held in Belgrade, Serbia, in September 2019. The 43 full papers presented together with 3 abstracts of keynotes were carefully reviewed and selected from 70 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; various aspects of computer security.
This book constitutes the proceedings of the 16th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2017, held in Bialystok, Poland, in June 2017. The 60 regular papers presented together with 5 keynotes were carefully reviewed and Selected from 85 submissions. They are organized in the following topical sections: algorithms; biometrics and pattern recognition applications; data analysis and information retrieval; engineering of enterprise software products; industrial management and other applications; modelling and optimization; various aspects of computer security.
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
|
You may like...
|