語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Intelligent systems design and appli...
~
Abraham, Ajith.
FindBook
Google Book
Amazon
博客來
Intelligent systems design and applications = information and network security.. Volume 3 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Intelligent systems design and applications/ edited by Ajith Abraham ... [et al.].
其他題名:
information and network security.
其他作者:
Abraham, Ajith.
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xvii, 479 p. :ill. (some col.), digital ;24 cm.
內容註:
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
Contained By:
Springer Nature eBook
標題:
Expert systems (Computer science) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-64650-8
ISBN:
9783031646508
Intelligent systems design and applications = information and network security.. Volume 3 /
Intelligent systems design and applications
information and network security.Volume 3 /[electronic resource] :edited by Ajith Abraham ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xvii, 479 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,10482367-3389 ;. - Lecture notes in networks and systems ;1048..
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security.
ISBN: 9783031646508
Standard No.: 10.1007/978-3-031-64650-8doiSubjects--Topical Terms:
572486
Expert systems (Computer science)
--Congresses.
LC Class. No.: QA76.76.E95 / I58 2024
Dewey Class. No.: 006.33
Intelligent systems design and applications = information and network security.. Volume 3 /
LDR
:03032nmm a2200337 a 4500
001
2374288
003
DE-He213
005
20240713130729.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031646508
$q
(electronic bk.)
020
$a
9783031646492
$q
(paper)
024
7
$a
10.1007/978-3-031-64650-8
$2
doi
035
$a
978-3-031-64650-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.E95
$b
I58 2024
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.33
$2
23
090
$a
QA76.76.E95
$b
I61 2024
245
0 0
$a
Intelligent systems design and applications
$h
[electronic resource] :
$b
information and network security.
$n
Volume 3 /
$c
edited by Ajith Abraham ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xvii, 479 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
1048
505
0
$a
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
520
$a
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security.
650
0
$a
Expert systems (Computer science)
$x
Congresses.
$3
572486
650
0
$a
Artificial intelligence
$v
Congresses.
$3
606815
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Abraham, Ajith.
$3
891046
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
International Conference on Intelligent Systems Design and Applications
$n
(23rd :
$d
2023 :
$c
Olten, Switzerland ; Porto, Portgual ; Kaunas, Lithuania ; Noida, India ; Kochi, India ; Online)
$3
3723044
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
1048.
$3
3723043
856
4 0
$u
https://doi.org/10.1007/978-3-031-64650-8
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9494737
電子資源
11.線上閱覽_V
電子書
EB QA76.76.E95 I58 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入