You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 20th International Conference on Data Science, ICDATA 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024. This proceedings book includes 39 papers selected from a total of 243 submissions. They are organized in topical sections as follows: Artificial intelligence, data science, and neural networks; natural language processing, large language modelc, generative AI; data science, data analytics, and applications; prediction and forecasting and security applications; and poster papers.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Design, Specification, and Verification of Interactive Systems, DSVIS 2006, held in Dublin, Ireland in July 2006. The 19 revised full papers presented together with one keynote paper, and two working group reports were carefully reviewed and selected from 57 submissions during two rounds of reviewing and improvement.
None