Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.
Telecommunication technology --- Applied physical engineering --- Mass communications --- Programming --- Information systems --- ICT (informatie- en communicatietechnieken) --- informatiesystemen --- tekstverwerking --- systeemontwikkeling (informatica) --- methodologieën --- ingenieurswetenschappen --- communicatietechnologie --- gegevensverwerking
Choose an application
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artificial intelligence/ machine learning security.
Computers. --- Computer communication systems. --- Architecture, Computer. --- Data encryption (Computer science). --- Computer security. --- Artificial intelligence. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Computer System Implementation. --- Cryptology. --- Systems and Data Security. --- Artificial Intelligence. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Architecture, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Distributed processing
Choose an application
Computers. --- Artificial intelligence. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artificial intelligence/ machine learning security.
Choose an application
This book constitutes the refereed proceedings of the Second International Conference on Big Data and Security, ICBDS 2020, held in Singapore, Singapore, in December 2020. The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and artificial intelligence/ machine learning security.
Programming --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- informatica --- programmeren (informatica) --- software engineering --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken
Choose an application
Choose an application
Programming --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- informatica --- programmeren (informatica) --- software engineering --- computerbeveiliging --- KI (kunstmatige intelligentie) --- computernetwerken
Choose an application
This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.
Computers -- Technological innovations -- Congresses. --- Electronic data processing. --- Information technology -- Congresses. --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Information technology. --- Computer software. --- Software, Computer --- IT (Information technology) --- Telecommunication. --- Information systems. --- Communications Engineering, Networks. --- Computing Methodologies. --- Information Systems and Communication Service. --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Automation --- Computer systems --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Artificial intelligence. --- Artificial Intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Electrical engineering. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Calculators --- Cyberspace --- Electric engineering --- Engineering
Choose an application
Computer security. --- Big data. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data sets, Large --- Large data sets --- Data sets --- Protection --- Security measures
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022, held in Xiamen, China, during December 8–12, 2022. The 51 full papers and 3 short papers included in this book were carefully reviewed and selected from 211 submissions. They were organized in topical sections as follows: answer set programming; big data and new method; intelligence and machine learning security; data technology and network security; sybersecurity and privacy; IoT security.
Computer engineering. --- Computer networks. --- Data protection. --- Artificial intelligence. --- Computer systems. --- Computer Engineering and Networks. --- Data and Information Security. --- Artificial Intelligence. --- Computer Communication Networks. --- Computer System Implementation. --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Network computers --- Computers --- Distributed processing --- Design and construction --- Mathematics
Listing 1 - 10 of 13 | << page >> |
Sort by
|