語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security with intelligent computing ...
~
Peng, Sheng-Lung.
Security with intelligent computing and big-data services
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security with intelligent computing and big-data services/ edited by Sheng-Lung Peng ... [et al.].
其他作者:
Peng, Sheng-Lung.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer International Publishing : : 2018.,
面頁冊數:
xvi, 372 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-76451-1
ISBN:
9783319764511
Security with intelligent computing and big-data services
Security with intelligent computing and big-data services
[electronic resource] /edited by Sheng-Lung Peng ... [et al.]. - Cham :Springer International Publishing :2018. - xvi, 372 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.7332194-5357 ;. - Advances in intelligent systems and computing ;173..
A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space -- Compact Cat Swarm Optimization Algorithm -- An Extension of Attack Trees -- History Management for Network Information of IoT Devices -- Strategies to Improve Auditing Performance and Soundness for Could Computation -- A Generic Web Application Testing and Attack Data Generation Method.
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.
ISBN: 9783319764511
Standard No.: 10.1007/978-3-319-76451-1doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security with intelligent computing and big-data services
LDR
:02678nam a2200325 a 4500
001
924990
003
DE-He213
005
20180912173402.0
006
m d
007
cr nn 008maaau
008
190625s2018 gw s 0 eng d
020
$a
9783319764511
$q
(electronic bk.)
020
$a
9783319764504
$q
(paper)
024
7
$a
10.1007/978-3-319-76451-1
$2
doi
035
$a
978-3-319-76451-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2017
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Security with intelligent computing and big-data services
$h
[electronic resource] /
$c
edited by Sheng-Lung Peng ... [et al.].
260
$a
Cham :
$c
2018.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xvi, 372 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.733
505
0
$a
A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space -- Compact Cat Swarm Optimization Algorithm -- An Extension of Attack Trees -- History Management for Network Information of IoT Devices -- Strategies to Improve Auditing Performance and Soundness for Could Computation -- A Generic Web Application Testing and Attack Data Generation Method.
520
$a
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Artificial intelligence
$3
671585
650
0
$a
Big data
$v
Congresses.
$3
882536
650
1 4
$a
Engineering.
$3
561152
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
593924
650
2 4
$a
Security.
$3
1114130
700
1
$a
Peng, Sheng-Lung.
$3
815699
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
173.
$3
884093
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-76451-1
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入