語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Contributions presented at the Inter...
~
International Conference on Computing, Communication, Cybersecurity and AI ((2024 :)
FindBook
Google Book
Amazon
博客來
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK = the C3AI 2024 /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK/ edited by Nitin Naik ... [et al.].
其他題名:
the C3AI 2024 /
其他題名:
C3AI 2024
其他作者:
Naik, Nitin.
團體作者:
International Conference on Computing, Communication, Cybersecurity and AI
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
ix, 826 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Security model for IoT applications IoTSeMo -- DAN Deep Neural Network-based Application Mapping for Optimized Network-on-Chip Design -- Threat Modelling in Virtual Assistant Hub Devices -- Generate Unnoticeable Adversarial Examples on Audio Classification Models with Multi perspective Objectives -- Prior enhanced Semi supervised Federated Learning for IoT Intrusion Detection A Game Theory and Comparative Learning based Approach -- An empirical study on Insider Threats Towards Crime Prevention through Environmental Design CPTED A student case study -- Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service DDoS Attacks -- Inspecting software architecture design styles to infer threat models and inform likely attacks.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-74443-3
ISBN:
9783031744433
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK = the C3AI 2024 /
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK
the C3AI 2024 /[electronic resource] :C3AI 2024edited by Nitin Naik ... [et al.]. - Cham :Springer Nature Switzerland :2024. - ix, 826 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in networks and systems,8842367-3389 ;. - Lecture notes in networks and systems ;884..
Security model for IoT applications IoTSeMo -- DAN Deep Neural Network-based Application Mapping for Optimized Network-on-Chip Design -- Threat Modelling in Virtual Assistant Hub Devices -- Generate Unnoticeable Adversarial Examples on Audio Classification Models with Multi perspective Objectives -- Prior enhanced Semi supervised Federated Learning for IoT Intrusion Detection A Game Theory and Comparative Learning based Approach -- An empirical study on Insider Threats Towards Crime Prevention through Environmental Design CPTED A student case study -- Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service DDoS Attacks -- Inspecting software architecture design styles to infer threat models and inform likely attacks.
This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2024), held in London, UK, from July 3 to 4, 2024. The conference attracted 66 submissions from 17 countries, including the USA, UK, Canada, Brazil, India, China, Germany, and Spain. Of these, 47 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.
ISBN: 9783031744433
Standard No.: 10.1007/978-3-031-74443-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK = the C3AI 2024 /
LDR
:03022nmm a2200349 a 4500
001
2389036
003
DE-He213
005
20241220115605.0
006
m d
007
cr nn 008maaau
008
250916s2024 sz s 0 eng d
020
$a
9783031744433
$q
(electronic bk.)
020
$a
9783031744426
$q
(paper)
024
7
$a
10.1007/978-3-031-74443-3
$2
doi
035
$a
978-3-031-74443-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
International Conference on Computing, Communication, Cybersecurity and AI
$d
(2024 :
$c
London, England)
$3
3754500
245
1 0
$a
Contributions presented at the International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK
$h
[electronic resource] :
$b
the C3AI 2024 /
$c
edited by Nitin Naik ... [et al.].
246
3
$a
C3AI 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
ix, 826 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
884
505
0
$a
Security model for IoT applications IoTSeMo -- DAN Deep Neural Network-based Application Mapping for Optimized Network-on-Chip Design -- Threat Modelling in Virtual Assistant Hub Devices -- Generate Unnoticeable Adversarial Examples on Audio Classification Models with Multi perspective Objectives -- Prior enhanced Semi supervised Federated Learning for IoT Intrusion Detection A Game Theory and Comparative Learning based Approach -- An empirical study on Insider Threats Towards Crime Prevention through Environmental Design CPTED A student case study -- Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service DDoS Attacks -- Inspecting software architecture design styles to infer threat models and inform likely attacks.
520
$a
This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2024), held in London, UK, from July 3 to 4, 2024. The conference attracted 66 submissions from 17 countries, including the USA, UK, Canada, Brazil, India, China, Germany, and Spain. Of these, 47 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Telecommunication
$x
Congresses.
$3
674821
650
0
$a
Artificial intelligence
$v
Congresses.
$3
606815
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Naik, Nitin.
$3
3713415
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
884.
$3
3754501
856
4 0
$u
https://doi.org/10.1007/978-3-031-74443-3
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9499800
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入