| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990006803840403321 |
|
|
Autore |
Wunsch, Guillaume |
|
|
Titolo |
Techniques d'analyse des donnees demographiques deficientes / Guillaume Wunsch |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Université de Louvain. Département de démographie |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910416082403321 |
|
|
Titolo |
Big Data and Security : First International Conference, ICBDS 2019, Nanjing, China, December 20–22, 2019, Revised Selected Papers / / edited by Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XV, 656 p. 244 illus., 159 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 1210 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Database management |
Computer networks |
Computer systems |
Cryptography |
Data encryption (Computer science) |
Data protection |
Artificial intelligence |
Database Management System |
Computer Communication Networks |
Computer System Implementation |
Cryptology |
Data and Information Security |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Cybersecurity & Privacy -- Big Data -- Blockchain & Internet of Things -- Security in Cloud and Fog Computing -- Artificial Intelligence/ Machine Learning Security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the First International Conference on Big Data and Security, ICBDS 2019, held in Nanjing, China, in December 2019. The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artificial intelligence/ machine learning security. |
|
|
|
|
|
|
|
| |