Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.
This book constitutes the refereed proceedings of the 4th International Conference on Soft Computing, Intelligent Systems, and Information Technology, ICSIIT 2015, held in Bali, Indonesia, in March 2015. The 34 revised full papers presented together with 19 short papers, one keynote and 2 invited talks were carefully reviewed and selected from 92 submissions. The papers cover a wide range of topics related to intelligence in the era of Big Data, such as fuzzy logic and control system; genetic algorithm and heuristic approaches; artificial intelligence and machine learning; similarity-based models; classification and clustering techniques; intelligent data processing; feature extraction; image recognition; visualization techniques; intelligent network; cloud and parallel computing; strategic planning; intelligent applications; and intelligent systems for enterprise, government and society.
|
You may like...
|