Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Intelligent systems design and appli...
~
Abraham, Ajith.
Linked to FindBook
Google Book
Amazon
博客來
Intelligent systems design and applications = information and network security.. Volume 3 /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Intelligent systems design and applications/ edited by Ajith Abraham ... [et al.].
Reminder of title:
information and network security.
other author:
Abraham, Ajith.
Published:
Cham :Springer Nature Switzerland : : 2024.,
Description:
xvii, 479 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
Contained By:
Springer Nature eBook
Subject:
Expert systems (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-64650-8
ISBN:
9783031646508
Intelligent systems design and applications = information and network security.. Volume 3 /
Intelligent systems design and applications
information and network security.Volume 3 /[electronic resource] :edited by Ajith Abraham ... [et al.]. - Cham :Springer Nature Switzerland :2024. - xvii, 479 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,10482367-3389 ;. - Lecture notes in networks and systems ;1048..
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security.
ISBN: 9783031646508
Standard No.: 10.1007/978-3-031-64650-8doiSubjects--Topical Terms:
572486
Expert systems (Computer science)
--Congresses.
LC Class. No.: QA76.76.E95 / I58 2024
Dewey Class. No.: 006.33
Intelligent systems design and applications = information and network security.. Volume 3 /
LDR
:03032nmm a2200337 a 4500
001
2374288
003
DE-He213
005
20240713130729.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031646508
$q
(electronic bk.)
020
$a
9783031646492
$q
(paper)
024
7
$a
10.1007/978-3-031-64650-8
$2
doi
035
$a
978-3-031-64650-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.E95
$b
I58 2024
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.33
$2
23
090
$a
QA76.76.E95
$b
I61 2024
245
0 0
$a
Intelligent systems design and applications
$h
[electronic resource] :
$b
information and network security.
$n
Volume 3 /
$c
edited by Ajith Abraham ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xvii, 479 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
1048
505
0
$a
Misdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks.
520
$a
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security.
650
0
$a
Expert systems (Computer science)
$x
Congresses.
$3
572486
650
0
$a
Artificial intelligence
$v
Congresses.
$3
606815
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Abraham, Ajith.
$3
891046
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
International Conference on Intelligent Systems Design and Applications
$n
(23rd :
$d
2023 :
$c
Olten, Switzerland ; Porto, Portgual ; Kaunas, Lithuania ; Noida, India ; Kochi, India ; Online)
$3
3723044
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
1048.
$3
3723043
856
4 0
$u
https://doi.org/10.1007/978-3-031-64650-8
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9494737
電子資源
11.線上閱覽_V
電子書
EB QA76.76.E95 I58 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login