Author:
Publisher:
ISBN: 9781509020546
Category :
Languages : en
Pages :
Book Description
2016 IEEE 41st Conference on Local Computer Networks
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
Author: Hani Ragab Hassen
Publisher: Springer Nature
ISBN: 303095918X
Category : Technology & Engineering
Languages : en
Pages : 150
Book Description
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
Publisher: Springer Nature
ISBN: 303095918X
Category : Technology & Engineering
Languages : en
Pages : 150
Book Description
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2019
Author: Sukhan Lee
Publisher: Springer
ISBN: 3030190633
Category : Technology & Engineering
Languages : en
Pages : 1134
Book Description
Over past few years, technologies have experienced boundaries getting blurred and concept of convergence to gain prominence. Harnessing from this, two main tracks for information processing management and communication are held, covering both research and application works of information management, intelligent information processing, interaction management, networking/ telecommunications, and social interaction. This book creates unique opportunity for research convergence among truly diverse technology domains of computer science. Leveraging from this diversity of topics, researchers get to generate novel research ideas by seeking application of their research in a different technology domain. This volume represents the collection of papers presented at the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM 2019), held on 4-6 January 2019 in Phuket, Thailand. Out of 228 papers submitted from all around the world 88 papers were accepted for presentations. The 88 contributions to this volume are organized into 5 chapters: Chapter 1. Network Evolution, Chapter 2. Intelligent and Secure Network, Chapter 3. Image and Video Processing, Chapter 4. Information Technology and Society, and Chapter 5. Data Mining and Learning. Our editors wish readers to find this volume informative and enjoyable.
Publisher: Springer
ISBN: 3030190633
Category : Technology & Engineering
Languages : en
Pages : 1134
Book Description
Over past few years, technologies have experienced boundaries getting blurred and concept of convergence to gain prominence. Harnessing from this, two main tracks for information processing management and communication are held, covering both research and application works of information management, intelligent information processing, interaction management, networking/ telecommunications, and social interaction. This book creates unique opportunity for research convergence among truly diverse technology domains of computer science. Leveraging from this diversity of topics, researchers get to generate novel research ideas by seeking application of their research in a different technology domain. This volume represents the collection of papers presented at the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM 2019), held on 4-6 January 2019 in Phuket, Thailand. Out of 228 papers submitted from all around the world 88 papers were accepted for presentations. The 88 contributions to this volume are organized into 5 chapters: Chapter 1. Network Evolution, Chapter 2. Intelligent and Secure Network, Chapter 3. Image and Video Processing, Chapter 4. Information Technology and Society, and Chapter 5. Data Mining and Learning. Our editors wish readers to find this volume informative and enjoyable.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23)
Author: Kevin Daimi
Publisher: Springer Nature
ISBN: 3031337433
Category : Technology & Engineering
Languages : en
Pages : 670
Book Description
This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing.
Publisher: Springer Nature
ISBN: 3031337433
Category : Technology & Engineering
Languages : en
Pages : 670
Book Description
This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing.
The 7th International Conference on Information Science, Communication and Computing
Author: Xuesong Qiu
Publisher: Springer Nature
ISBN: 9819971616
Category : Technology & Engineering
Languages : en
Pages : 362
Book Description
This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.
Publisher: Springer Nature
ISBN: 9819971616
Category : Technology & Engineering
Languages : en
Pages : 362
Book Description
This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.
Handbook of Whale Optimization Algorithm
Author: Seyedali Mirjalili
Publisher: Elsevier
ISBN: 0323953646
Category : Computers
Languages : en
Pages : 688
Book Description
Handbook of Whale Optimization Algorithm: Variants, Hybrids, Improvements, and Applications provides the most in-depth look at an emerging meta-heuristic that has been widely used in both science and industry. Whale Optimization Algorithm has been cited more than 5000 times in Google Scholar, thus solving optimization problems using this algorithm requires addressing a number of challenges including multiple objectives, constraints, binary decision variables, large-scale search space, dynamic objective function, and noisy parameters to name a few. This handbook provides readers with in-depth analysis of this algorithm and existing methods in the literature to cope with such challenges. The authors and editors also propose several improvements, variants and hybrids of this algorithm. Several applications are also covered to demonstrate the applicability of methods in this book. Provides in-depth analysis of equations, mathematical models and mechanisms of the Whale Optimization Algorithm Proposes different variants of the Whale Optimization Algorithm to solve binary, multiobjective, noisy, dynamic and combinatorial optimization problems Demonstrates how to design, develop and test different hybrids of Whale Optimization Algorithm Introduces several application areas of the Whale Optimization Algorithm, focusing on sustainability Includes source code from applications and algorithms that is available online
Publisher: Elsevier
ISBN: 0323953646
Category : Computers
Languages : en
Pages : 688
Book Description
Handbook of Whale Optimization Algorithm: Variants, Hybrids, Improvements, and Applications provides the most in-depth look at an emerging meta-heuristic that has been widely used in both science and industry. Whale Optimization Algorithm has been cited more than 5000 times in Google Scholar, thus solving optimization problems using this algorithm requires addressing a number of challenges including multiple objectives, constraints, binary decision variables, large-scale search space, dynamic objective function, and noisy parameters to name a few. This handbook provides readers with in-depth analysis of this algorithm and existing methods in the literature to cope with such challenges. The authors and editors also propose several improvements, variants and hybrids of this algorithm. Several applications are also covered to demonstrate the applicability of methods in this book. Provides in-depth analysis of equations, mathematical models and mechanisms of the Whale Optimization Algorithm Proposes different variants of the Whale Optimization Algorithm to solve binary, multiobjective, noisy, dynamic and combinatorial optimization problems Demonstrates how to design, develop and test different hybrids of Whale Optimization Algorithm Introduces several application areas of the Whale Optimization Algorithm, focusing on sustainability Includes source code from applications and algorithms that is available online
Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023)
Author: José Bravo
Publisher: Springer Nature
ISBN: 3031485904
Category :
Languages : en
Pages : 270
Book Description
Publisher: Springer Nature
ISBN: 3031485904
Category :
Languages : en
Pages : 270
Book Description
Handbook Of Software Aging And Rejuvenation: Fundamentals, Methods, Applications, And Future Directions
Author: Tadashi Dohi
Publisher: World Scientific
ISBN: 9811214581
Category : Computers
Languages : en
Pages : 424
Book Description
The Handbook of Software Aging and Rejuvenation provides a comprehensive overview of the subject, making it indispensable to graduate students as well as professionals in the field. It begins by introducing fundamental concepts, definitions, and the history of software aging and rejuvenation research, followed by methods, tools, and strategies that can be used to detect, analyze, and overcome software aging.
Publisher: World Scientific
ISBN: 9811214581
Category : Computers
Languages : en
Pages : 424
Book Description
The Handbook of Software Aging and Rejuvenation provides a comprehensive overview of the subject, making it indispensable to graduate students as well as professionals in the field. It begins by introducing fundamental concepts, definitions, and the history of software aging and rejuvenation research, followed by methods, tools, and strategies that can be used to detect, analyze, and overcome software aging.
Handbook of Mobile Data Privacy
Author: Aris Gkoulalas-Divanis
Publisher: Springer
ISBN: 3319981617
Category : Computers
Languages : en
Pages : 426
Book Description
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
Publisher: Springer
ISBN: 3319981617
Category : Computers
Languages : en
Pages : 426
Book Description
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.