Download or read book Proceeding of International Conference on Computational Science and Applications written by Subhash Bhalla and published by Springer Nature. This book was released on 2020-01-04 with total page 447 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book consists of high-quality papers presented at the International Conference on Computational Science and Applications (ICCSA 2019), held at Maharashtra Institute of Technology World Peace University, Pune, India, from 7 to 9 August 2019. It covers the latest innovations and developments in information and communication technology, discussing topics such as soft computing and intelligent systems, web of sensor networks, drone operating systems, web of sensor networks, wearable smart sensors, automated guided vehicles and many more.
Download or read book Proceedings of the Tenth International Conference on Mathematics and Computing written by Debasis Giri and published by Springer Nature. This book was released on with total page 270 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Computer Security ESORICS 2024 written by Joaquin Garcia-Alfaro and published by Springer Nature. This book was released on with total page 495 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Computer Security ESORICS 2019 written by Kazue Sako and published by Springer Nature. This book was released on 2019-09-15 with total page 640 pages. Available in PDF, EPUB and Kindle. Book excerpt: The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.
Download or read book Computer Security ESORICS 2017 written by Simon N. Foley and published by Springer. This book was released on 2017-09-01 with total page 573 pages. Available in PDF, EPUB and Kindle. Book excerpt: The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
Download or read book Computer Security ESORICS 2024 written by Joaquin Garcia-Alfaro and published by Springer Nature. This book was released on with total page 461 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Proceedings of Third International Conference on Sustainable Expert Systems written by Subarna Shakya and published by Springer Nature. This book was released on 2023-02-22 with total page 1025 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features high-quality research papers presented at the 3rd International Conference on Sustainable Expert Systems (ICSES 2022), held in Nepal during September 9–10, 2022. The book focuses on the research information related to artificial intelligence, sustainability and expert systems applied in almost all the areas of industries, government sectors and educational institutions worldwide. The main thrust of the book is to publish the conference papers that deal with the design, implementation, development, testing and management of intelligent and sustainable expert systems and also to provide both theoretical and practical guidelines for the deployment of these systems.
Download or read book Proceedings of the Seventh International Conference on Mathematics and Computing written by Debasis Giri and published by Springer Nature. This book was released on 2022-03-05 with total page 1109 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
Download or read book Computer Security ESORICS 2022 written by Vijayalakshmi Atluri and published by Springer Nature. This book was released on 2022-09-23 with total page 798 pages. Available in PDF, EPUB and Kindle. Book excerpt: The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
Download or read book Computer Security ESORICS 2021 written by Elisa Bertino and published by Springer Nature. This book was released on 2021-09-29 with total page 798 pages. Available in PDF, EPUB and Kindle. Book excerpt: The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.
Download or read book Secure Knowledge Management In Artificial Intelligence Era written by Sanjay K. Sahay and published by Springer Nature. This book was released on 2020-03-05 with total page 218 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions. They were organized according to the following topical sections: cyber security; security and artifcial intelligence; access control models; and social networks.
Download or read book Applied Smart Health Care Informatics written by Sourav De and published by John Wiley & Sons. This book was released on 2022-02-23 with total page 228 pages. Available in PDF, EPUB and Kindle. Book excerpt: Applied Smart Health Care Informatics Explores how intelligent systems offer new opportunities for optimizing the acquisition, storage, retrieval, and use of information in healthcare Applied Smart Health Care Informatics explores how health information technology and intelligent systems can be integrated and deployed to enhance healthcare management. Edited and authored by leading experts in the field, this timely volume introduces modern approaches for managing existing data in the healthcare sector by utilizing artificial intelligence (AI), meta-heuristic algorithms, deep learning, the Internet of Things (IoT), and other smart technologies. Detailed chapters review advances in areas including machine learning, computer vision, and soft computing techniques, and discuss various applications of healthcare management systems such as medical imaging, electronic medical records (EMR), and drug development assistance. Throughout the text, the authors propose new research directions and highlight the smart technologies that are central to establishing proactive health management, supporting enhanced coordination of care, and improving the overall quality of healthcare services. Provides an overview of different deep learning applications for intelligent healthcare informatics management Describes novel methodologies and emerging trends in artificial intelligence and computational intelligence and their relevance to health information engineering and management Proposes IoT solutions that disseminate essential medical information for intelligent healthcare management Discusses mobile-based healthcare management, content-based image retrieval, and computer-aided diagnosis using machine and deep learning techniques Examines the use of exploratory data analysis in intelligent healthcare informatics systems Applied Smart Health Care Informatics: A Computational Intelligence Perspective is an invaluable text for graduate students, postdoctoral researchers, academic lecturers, and industry professionals working in the area of healthcare and intelligent soft computing.
Download or read book Financial Cryptography and Data Security written by Matthew Bernhard and published by Springer Nature. This book was released on 2020-08-06 with total page 635 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
Download or read book Information Security and Cryptology written by Yongdong Wu and published by Springer Nature. This book was released on 2021-03-12 with total page 503 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.
Download or read book Machine Learning for Data Streams written by Albert Bifet and published by MIT Press. This book was released on 2018-03-16 with total page 255 pages. Available in PDF, EPUB and Kindle. Book excerpt: A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework. Today many information sources—including sensor networks, financial markets, social networks, and healthcare monitoring—are so-called data streams, arriving sequentially and at high speed. Analysis must take place in real time, with partial data and without the capacity to store the entire data set. This book presents algorithms and techniques used in data stream mining and real-time analytics. Taking a hands-on approach, the book demonstrates the techniques using MOA (Massive Online Analysis), a popular, freely available open-source software framework, allowing readers to try out the techniques after reading the explanations. The book first offers a brief introduction to the topic, covering big data mining, basic methodologies for mining data streams, and a simple example of MOA. More detailed discussions follow, with chapters on sketching techniques, change, classification, ensemble methods, regression, clustering, and frequent pattern mining. Most of these chapters include exercises, an MOA-based lab session, or both. Finally, the book discusses the MOA software, covering the MOA graphical user interface, the command line, use of its API, and the development of new methods within MOA. The book will be an essential reference for readers who want to use data stream mining as a tool, researchers in innovation or data stream mining, and programmers who want to create new algorithms for MOA.
Download or read book Federated and Transfer Learning written by Roozbeh Razavi-Far and published by Springer Nature. This book was released on 2022-09-30 with total page 371 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides a collection of recent research works on learning from decentralized data, transferring information from one domain to another, and addressing theoretical issues on improving the privacy and incentive factors of federated learning as well as its connection with transfer learning and reinforcement learning. Over the last few years, the machine learning community has become fascinated by federated and transfer learning. Transfer and federated learning have achieved great success and popularity in many different fields of application. The intended audience of this book is students and academics aiming to apply federated and transfer learning to solve different kinds of real-world problems, as well as scientists, researchers, and practitioners in AI industries, autonomous vehicles, and cyber-physical systems who wish to pursue new scientific innovations and update their knowledge on federated and transfer learning and their applications.
Download or read book Applied Cryptography and Network Security Workshops written by Jianying Zhou and published by Springer Nature. This book was released on 2022-09-23 with total page 630 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: – AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security – AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security – AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security – CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security – Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy – SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation – SecMT: 3rd ACNS Workshop on Security in Mobile Technologies – SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications