Cloud Computing and Security [[electronic resource] ] : 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVIII, 743 p. 290 illus.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Computer security Artificial intelligence Information Systems Applications (incl. Internet) Systems and Data Security Artificial Intelligence |
ISBN | 3-030-00009-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud Computing -- Encryption -- Information Hiding -- Cloud Security -- IoT Security. |
Record Nr. | UNISA-996466198703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cloud Computing, Security, Privacy in New Computing Environments [[electronic resource] ] : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings / / edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIV, 240 p. 61 illus.) |
Disciplina | 004.6782 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Application software Computer security Data encryption (Computer science) Data protection Artificial intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Cryptology Security Artificial Intelligence |
ISBN | 3-319-69605-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV. . |
Record Nr. | UNINA-9910299289503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Collaborate Computing: Networking, Applications and Worksharing [[electronic resource] ] : 12th International Conference, CollaborateCom 2016, Beijing, China, November 10–11, 2016, Proceedings / / edited by Shangguang Wang, Ao Zhou |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 699 p. 279 illus.) |
Disciplina | 004.6 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Information storage and retrieval
Artificial intelligence Application software Computer communication systems Computer security E-commerce Information Storage and Retrieval Artificial Intelligence Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security e-Commerce/e-business |
ISBN | 3-319-59288-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | participatory sensing -- crowdsourcing, and citizen science -- architectures, protocols, and enabling technologies for collaborative computing networks and systems -- autonomic computing and quality of services in collaborative networks, systems, and applications -- collaboration in pervasive and cloud computing environments -- collaboration in data-intensive scientific discovery -- collaboration in social media -- big data and spatio-temporal data in collaborative environments/systems -- collaboration techniques in data-intensive computing and cloud computing. |
Record Nr. | UNINA-9910254812103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (VIII, 293 p. 182 illus., 114 illus. in color.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Artificial intelligence Special purpose computers Computer security Computer Communication Networks Artificial Intelligence Special Purpose and Application-Based Systems Systems and Data Security |
ISBN | 3-030-10659-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Implementation of Energy Efficient WBAN Using IEEE 802.15.6 Scheduled Access MAC for e-Healthcare -- Improved Physical Downlink Control Channel for 3GPP Massive Machine Type Communications -- User Response Based Recommendations -- Game Theory Based Network Partitioning Approaches for Controller Placement in SDN -- NeMoI: Network Mobility in ICN -- On the Impact of Duty Cycled LTE-U on Wi-Fi Users -- Pricing and Commission in Two-Sided Markets with Free Upgrades -- A Directional Medium Access Control Protocol for 5G Millimeter-Wave Local Area Networks -- INCARNATE: An Interference and Mobility Aware Spatial Scheme for Tightly Coupled LTE-Wi-Fi Networks -- PKHSN: A Pairing Based Key Management Scheme for Heterogeneous Sensor Networks -- Use of Facial Landmarks for Adaptive Compression of Videos on Mobile Devices -- Leveraging SDN for Early Detection and Mitigation of DDoS Attacks. |
Record Nr. | UNINA-9910337584403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication Systems and Networks [[electronic resource] ] : 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers / / edited by Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (VIII, 293 p. 182 illus., 114 illus. in color.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Artificial intelligence Special purpose computers Computer security Computer Communication Networks Artificial Intelligence Special Purpose and Application-Based Systems Systems and Data Security |
ISBN | 3-030-10659-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Implementation of Energy Efficient WBAN Using IEEE 802.15.6 Scheduled Access MAC for e-Healthcare -- Improved Physical Downlink Control Channel for 3GPP Massive Machine Type Communications -- User Response Based Recommendations -- Game Theory Based Network Partitioning Approaches for Controller Placement in SDN -- NeMoI: Network Mobility in ICN -- On the Impact of Duty Cycled LTE-U on Wi-Fi Users -- Pricing and Commission in Two-Sided Markets with Free Upgrades -- A Directional Medium Access Control Protocol for 5G Millimeter-Wave Local Area Networks -- INCARNATE: An Interference and Mobility Aware Spatial Scheme for Tightly Coupled LTE-Wi-Fi Networks -- PKHSN: A Pairing Based Key Management Scheme for Heterogeneous Sensor Networks -- Use of Facial Landmarks for Adaptive Compression of Videos on Mobile Devices -- Leveraging SDN for Early Detection and Mitigation of DDoS Attacks. |
Record Nr. | UNISA-996466454903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications [[electronic resource] /] / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 455 p. 170 illus., 12 illus. in color.) |
Disciplina | 006.3 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Computer security Artificial intelligence Computational Intelligence Systems and Data Security Artificial Intelligence |
ISBN | 3-319-05885-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Forensic Discovery and Investigation -- Intelligent Forensic Science Applications. |
Record Nr. | UNINA-9910299719203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Intelligence, Cyber Security and Computational Models [[electronic resource] ] : Proceedings of ICC3 2015 / / edited by Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (575 p.) |
Disciplina | 006 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Computer security Computer science—Mathematics Computer mathematics Artificial intelligence Computational Intelligence Systems and Data Security Mathematical Applications in Computer Science Artificial Intelligence |
ISBN | 981-10-0251-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I_Keynote Address: 1. The game of Wall Cops and Robbers -- 2. Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. Analysis of Throat Microphone Using MFCC features for Speaker Recognition -- Chapter 2. Single-pixel Based Double Random-Phase Encoding Technique -- Chapter 3. Kernel Online Multi-task Learning -- Chapter 4. Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Learning Scenario -- Chapter 5. An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distribution -- Chapter 6. Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multi-layer Perceptron as Post Classifiers for the Classification of Epilepsy Risk Levels from EEG Signals -- Chapter 7. Suspicious Human Activity Detection in Classroom Examination -- Chapter 8. H ∞ State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Using Second Order Reciprocal Convex Approach -- Chapter 9. A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial References -- Chapter 10. A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain -- Chapter 11. Motor imagery Classification Based on Variable Precision Multigranulation Rough Set -- Chapter 12. Fault Tolerant and Energy Efficient Signal Processing on FPGA Using Evolutionary Techniques -- Chapter 13. A Two Phase Approach for Efficient Clustering of Web Services -- Chapter 14. Elimination of Redundant Association Rules – An Efficient Linear Approach -- Chapter 15. Clustering Techniques from Significance Analysis of Microarrays -- Chapter 16. Breast Region Extraction and Pectoral Removal by Pixel Constancy Constraint approach in Mammograms -- Chapter 17. Bridging the Semantic Gap in Image Search via Visual Semantic Descriptors by Integrating Text and Visual Features -- Chapter 18. Adaptive Equalization Algorithm for Electrocardiogram Signal Transmission -- Chapter 19. An Efficient Approach for MapReduce Result Verification -- Chapter 20. Improving Lifetime of Memory Devices Using Evolutionary Computing Based Error Correction Coding -- Chapter 21. Comparison of Machine Learning Techniques for the Identification of the Stages of Parkinson's Disease -- Chapter 22. Security Constrained Unit Commitment Problem Employing Artificial Computational Intelligence for Wind-thermal Power System -- Chapter 23. Human Gait Recognition Using Fuzzy Logic -- Chapter 24. Detection and Diagnosis of Dilated and Hypertrophic Cardiomyopathy by Echocardiogram Sequences Analysis -- Chapter 25. An Elitist Genetic Algorithm Based Extreme Learning Machine -- Chapter 26. Formulation and Enhancement of User Adaptive Access to the Learning Resources in E-Learning Using Fuzzy Inference Engine -- Part III_Cyber Security: Chapter 27. A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme -- Chapter 28. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems -- Chapter 29. Implementation of ECDSA Using Sponge Based Hash Function -- Chapter 30. Contrast-Enhanced Visual Cryptography Schemes Based on Perfect Reconstruction of White Pixels and Additional Basis Matrix -- Chapter 31. Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-verifier for Digital Goods Providers -- Chapter 32. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation -- Chapter 33. A Lock and Key Share (2,m,n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions -- Chapter 34. Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques -- Chapter 35. K out of N Secret Sharing Scheme with Steganography and Authentication -- Chapter 36. A Centralized Trust Computation Model (CTC) for Secure Group Formation in Military Based Mobile Ad-hoc Networks Using Stereotypes -- Chapter 37. Cost Effective Re-keying Approach for Dynamic Membership Changes in Group Key Management -- Chapter 38. A Multipath Routing Protocol which Preserves Security and Anonymity of Data in Mobile Ad-hoc Networks -- Chapter 39. An Efficient Continuous Auditing Methodology for Outsourced Data Storage in Cloud Computing -- Part IV_Computational Models: Chapter 40. A Study on Building Seamless Communication Among Vehicles in Vanet Using the Integrated Agent Communication Model (IACM) -- Chapter 41. A Hybrid Approach for Data Hiding through Chaos Theory and Reversible Integer Mapping -- Chapter 42. Fluid Queue Driven by an M/E2/1 Queuing Model -- Chapter 43. An Effective Tool for optimizing the Number of Test Paths in Data Flow Testing for Anomaly Detection -- Chapter 44. Venus Flytrap Optimization -- Chapter 45. Zumkeller Cordial Labeling of Graphs -- Chapter 46. Cuckoo Based Resource Allocation for Mobile Cloud Environments -- Chapter 47. Transient Analysis of an M/M/c Queue Subject to Multiple Exponential Vacation -- Chapter 48. Fractional Filter Based Internal Model Controller for Nonlinear Process -- Chapter 49. A Novel Method for Solving Triangular and Trapezoidal Intuitionistic Fuzzy Games Using Dominance Property and Oddment Method. |
Record Nr. | UNINA-9910254198403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation [[electronic resource] ] : Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings / / edited by Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 255 p. 89 illus.) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computational intelligence Artificial intelligence Optical data processing Computer science—Mathematics Systems and Data Security Computational Intelligence Artificial Intelligence Image Processing and Computer Vision Mathematics of Computing |
ISBN |
981-13-0716-4
978-981-13-0716-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Short Review of Recent ELM Applications -- Critical Feature Selection and Critical Sampling for Data Mining -- From Recognition to Generation using Deep Learning: A Case Study with Video Generation -- Economic Dispatch Problem using Clustered Firefly -- Algorithm for Wind Thermal Power System -- A Novel and Efficient Multi-Hop Routing Algorithm for Manet -- Parameter Optimization of Adaptive Random Partition Testing by applying Artificial Bee Colony Algorithm -- A Novel Coherence Particle Swarm Optimization Algorithm with Specified Scrutiny of FCM(CPSO-SSFCM) in Detecting Leukemia for Microscopic Images -- Impact of Negative Correlations in Characterizing Cognitive Load States using EEG based Functional Brain Networks -- Frequent Sequence Mining Approach to Video Compression -- Deep Learning based Audio Scene Classification -- Cyber Security -- Certain Challenges in Biometrics System Development -- A Study on Various Cyber-Attacks and their Classification in UAV Assisted Vehicular Ad-Hoc Networks -- Computational Models -- Development of Buoy Information Monitoring System Based on 5G against the Abandoned, Lost and Discarded Fishing Gears -- Violation Resolution in Distributed Stream Networks -- Fluid Queue Driven by an M/M/1 Queue subject to Working Vacation and Impatience -- Hyers-Ulam Stability of Linear Differential Equations -- Cost analysis of an unreliable retrial queue subject to balking, Bernoulli vacation, two types of service and starting failure -- Mathematical Modelling and Optimization of Lung Cancer in Smokers and Non Smokers -- Transient Analysis of an M/M/1 queue with Bernoulli Vacation and Vacation Interruption -- Behavioral analysis of temperature distribution in a three fluid heat exchanger via fractional derivative -- Intensive Analysis of Sub Synchronous Resonance in a DFIG Based Wind Energy Conversion System (WECS) Connected with Smart Grid. |
Record Nr. | UNINA-9910299301303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXIII, 596 p. 289 illus., 217 illus. in color.) |
Disciplina |
006.6
006.37 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Optical data processing
Pattern recognition Artificial intelligence Computer communication systems Computer security Image Processing and Computer Vision Pattern Recognition Artificial Intelligence Computer Communication Networks Systems and Data Security |
ISBN | 3-030-29891-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intelligent Systems -- Real-time and GPU Processing -- Image Segmentation -- Image and Texture Analysis -- Machine Learning for Image and Pattern Analysis -- Data Sets and Benchmarks -- Structural and Computational Pattern Recognition; Posters. . |
Record Nr. | UNINA-9910349303603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Analysis of Images and Patterns [[electronic resource] ] : 18th International Conference, CAIP 2019, Salerno, Italy, September 3–5, 2019, Proceedings, Part II / / edited by Mario Vento, Gennaro Percannella |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXIII, 596 p. 289 illus., 217 illus. in color.) |
Disciplina |
006.6
006.37 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Optical data processing
Pattern recognition Artificial intelligence Computer communication systems Computer security Image Processing and Computer Vision Pattern Recognition Artificial Intelligence Computer Communication Networks Systems and Data Security |
ISBN | 3-030-29891-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intelligent Systems -- Real-time and GPU Processing -- Image Segmentation -- Image and Texture Analysis -- Machine Learning for Image and Pattern Analysis -- Data Sets and Benchmarks -- Structural and Computational Pattern Recognition; Posters. . |
Record Nr. | UNISA-996466426503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|