Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Botnets
  • Language: en
  • Pages: 439

Botnets

  • Type: Book
  • -
  • Published: 2019-09-26
  • -
  • Publisher: CRC Press

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Advances in Information Processing and Protection
  • Language: en
  • Pages: 455

Advances in Information Processing and Protection

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.

Computer Security – ESORICS 2024
  • Language: en
  • Pages: 411

Computer Security – ESORICS 2024

description not available right now.

Computer Security – ESORICS 2024
  • Language: en
  • Pages: 495

Computer Security – ESORICS 2024

description not available right now.

Digital Forensics and Watermarking
  • Language: en
  • Pages: 394

Digital Forensics and Watermarking

  • Type: Book
  • -
  • Published: 2019-01-31
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.

Advances in Computing and Information Technology
  • Language: en
  • Pages: 712

Advances in Computing and Information Technology

The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.

Innovations in Cybersecurity Education
  • Language: en
  • Pages: 388

Innovations in Cybersecurity Education

This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.

Applied Edge AI
  • Language: en
  • Pages: 329

Applied Edge AI

  • Type: Book
  • -
  • Published: 2022-04-05
  • -
  • Publisher: CRC Press

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products, solutions and services. Businesses, individuals, and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools, the world is destined to have a dazzling array of edge-native, people-centric, event-driven, real-time, service-oriented, process-aware, and insights-filled services. Further on, business workloads and IT services will become competent and cog...

Computational Collective Intelligence
  • Language: en
  • Pages: 415

Computational Collective Intelligence

description not available right now.

Advances in Network Security and Applications
  • Language: en
  • Pages: 677

Advances in Network Security and Applications

  • Type: Book
  • -
  • Published: 2011-06-30
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.