You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice. It also focuses on high level concepts such as definitions of Big Data from different angles; surveys in research and applications; and existing tools, mechanisms, and systems in practice. Each chapter is independent from the other chapters, allowing users to read any chapter directly. After examining the practical side of Big Data, this book presents theoretical perspectives. The theoretical research ranges from Big Data representation, modeling and topolog...
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024. The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on Privacy and Cryptography AI for cybersecurity and Adversial models Quantum Computing in Cybersecurity Network Security Blockchain and Cryptocurrencies Fuzzing and IoT security Malware and Attack Analysis Web Security Authentication Large Language Model for Cybersecurity Security Assessments
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.
In his previous life, Shu Qing, as the direct daughter of the Prime Minister, was sent to a suburban manor and only returned at the age of 15. Since the day she returned to the residence, she wrongly trusted the evildoers. Her life was always in the calculations of others! She had no talent or virtue, was vulgar, unchaste, and sold her country to the common enemy. When a basin of sewage was poured onto her body, she actually fell to the point of dying a horrible death without anyone taking her corpse away! Fortunately, the heavens had the eyes to let her live a new life, and return to before she married the ungrateful one! However, her reputation had long been completely ruined by her vicious stepmother and little sister Shu. She was already the laughing stock of the entire capital! If she wanted revenge, she still had to take it step by step ... In her previous life, she would never let anyone who bullied her get away with torturing her. She swore to let those people taste the pain that was inflicted on her body.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
At last here is the long-awaited, first Western-language reference guide focusing exclusively on Chinese literature from ca. 700 B.C.E. to the early seventh century C.E. Alphabetically organized, it contains no less than 1095 entries on major and minor writers, literary forms and "schools," and important Chinese literary terms. In addition to providing authoritative information about each subject, the compilers have taken meticulous care to include detailed, up-to-date bibliographies and source information. The reader will find it a treasure-trove of historical accounts, especially when browsing through the biographies of authors. Indispensable for scholars and students of pre-modern Chinese literature, history, and thought. Part Three contains Xia - Y. Part Four contains the Z and an extensive index to the four volumes.
Includes all the vasular plants of China with brief descriptions, identification keys, essential synonymy, phenology, provincial distribution in China, brief statements on extra-Chinese distribution, and remarks regarding the circumscription of problematical taxa.