Computer and Information Security (eBook, PDF)
First World Conference, WCCIS 2024, Kuala Lumpur, Malaysia, September 20-22, 2024, Proceedings
Redaktion: Li, Chunguo; Yee Por, Lip
73,95 €
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
73,95 €
Als Download kaufen
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
37 °P sammeln
Computer and Information Security (eBook, PDF)
First World Conference, WCCIS 2024, Kuala Lumpur, Malaysia, September 20-22, 2024, Proceedings
Redaktion: Li, Chunguo; Yee Por, Lip
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20-22, 2024.
The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 25.34MB
Andere Kunden interessierten sich auch für
- Information Security Practice and Experience (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)65,95 €
- Information Security and Privacy (eBook, PDF)65,95 €
- Information Security and Privacy (eBook, PDF)59,95 €
- Security, Privacy and Anonymity in Computation, Communication and Storage (eBook, PDF)40,95 €
- Malware (eBook, PDF)161,95 €
- Javier Hernandez FernandezPhysical Layer Security in Power Line Communications (eBook, PDF)129,95 €
-
-
-
This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20-22, 2024.
The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.
The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 242
- Erscheinungstermin: 28. Juli 2025
- Englisch
- ISBN-13: 9783031969447
- Artikelnr.: 75016427
- Verlag: Springer International Publishing
- Seitenzahl: 242
- Erscheinungstermin: 28. Juli 2025
- Englisch
- ISBN-13: 9783031969447
- Artikelnr.: 75016427
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Computer Modeling and Intelligent Information Technology.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.
.- Computer Modeling and Intelligent Information Technology.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.