top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV / / edited by Jaideep Vaidya, Jin Li
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV / / edited by Jaideep Vaidya, Jin Li
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 662 p. 278 illus., 192 illus. in color.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer engineering
Computer networks
Software engineering
Computers and civilization
Computers—Law and legislation
Information technology—Law and legislation
Computer Engineering and Networks
Software Engineering
Computers and Society
Legal Aspects of Computing
ISBN 3-030-05063-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed and Parallel Computing -- High Performance Computing -- Big Data and Information Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.
Record Nr. UNISA-996466305803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV / / edited by Jaideep Vaidya, Jin Li
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV / / edited by Jaideep Vaidya, Jin Li
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 662 p. 278 illus., 192 illus. in color.)
Disciplina 004.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Algorithms
Computer engineering
Computer networks
Software engineering
Computers and civilization
Computers—Law and legislation
Information technology—Law and legislation
Computer Engineering and Networks
Software Engineering
Computers and Society
Legal Aspects of Computing
ISBN 3-030-05063-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed and Parallel Computing -- High Performance Computing -- Big Data and Information Processing -- Internet of Things and Cloud Computing -- Security and Privacy in Computing.
Record Nr. UNINA-9910349387803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Align Client and Provider Perspectives [[electronic resource] ] : Best Practices in IT Outsourcing / / by Lionel Haas
Align Client and Provider Perspectives [[electronic resource] ] : Best Practices in IT Outsourcing / / by Lionel Haas
Autore Haas Lionel
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 198 p.)
Disciplina 005.74
Soggetto topico Management information systems
Computer science
Computers
Law and legislation
Project management
Management of Computing and Information Systems
Software Management
Legal Aspects of Computing
Project Management
ISBN 3-319-92064-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Introduction -- 2 Discovery Phase: The Offer -- 3 Planning Phase: The Contract -- 4 Building Phase: The Project -- 5 Running Phase: The Operations.
Record Nr. UNINA-9910299162603321
Haas Lionel  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Analysis of Social Media and Ubiquitous Data [[electronic resource] ] : International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papers / / edited by Martin Atzmueller, Andreas Hotho, Markus Strohmaier, Alvin Chin
Analysis of Social Media and Ubiquitous Data [[electronic resource] ] : International Workshops MSM 2010, Toronto, Canada, June 13, 2010, and MUSE 2010, Barcelona, Spain, September 20, 2010, Revised Selected Papers / / edited by Martin Atzmueller, Andreas Hotho, Markus Strohmaier, Alvin Chin
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (VIII, 163 p. 52 illus., 35 illus. in color.)
Disciplina 302.231
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
User interfaces (Computer systems)
Application software
Computer communication systems
Computers
Law and legislation
Computers and civilization
Artificial Intelligence
User Interfaces and Human Computer Interaction
Information Systems Applications (incl. Internet)
Computer Communication Networks
Legal Aspects of Computing
Computers and Society
ISBN 3-642-23599-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466046003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security [[electronic resource] ] : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
Applications and Techniques in Information Security [[electronic resource] ] : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 313 p. 157 illus., 101 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data protection
Computers
Law and legislation
Artificial intelligence
Application software
Computer communication systems
Systems and Data Security
Security
Legal Aspects of Computing
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 981-15-0871-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .
Record Nr. UNINA-9910357850203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / / edited by Bart Preneel, Frederik Vercauteren
Applied Cryptography and Network Security [[electronic resource] ] : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / / edited by Bart Preneel, Frederik Vercauteren
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 716 p. 135 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Application software
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
ISBN 3-319-93387-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security.
Record Nr. UNINA-9910349434603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / / edited by Bart Preneel, Frederik Vercauteren
Applied Cryptography and Network Security [[electronic resource] ] : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / / edited by Bart Preneel, Frederik Vercauteren
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 716 p. 135 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Application software
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
ISBN 3-319-93387-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security.
Record Nr. UNISA-996465790403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Software engineering
Computers
Law and legislation
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Legal Aspects of Computing
ISBN 3-030-24268-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
Record Nr. UNINA-9910349310103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 655 p. 342 illus., 214 illus. in color.)
Disciplina 006.3
Collana Security and Cryptology
Soggetto topico Computer security
Artificial intelligence
Computers
Computer communication systems
Optical data processing
Law and legislation
Systems and Data Security
Artificial Intelligence
Information Systems and Communication Service
Computer Communication Networks
Image Processing and Computer Vision
Legal Aspects of Computing
ISBN 3-030-24274-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing -- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching -- NOAA-LSTM: A New Method of Dialect Identification -- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network -- Research on the Promotion of Tibetan New Words and Platform Design -- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm -- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields -- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM -- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud -- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network -- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process -- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix -- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory -- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation -- A Novel Noise Filter Based on Multiple Voting -- Fuzzy Control Method for Path Tracking System of Combine Harvester -- Research on Opinion Spam Detection by Time Series Anomaly Detection -- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images -- Intra-class Classification of Architectural Styles Using Visualization of CNN -- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks -- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module -- A Novel Distributed Knowledge Reasoning Model -- Research on Detection Method Of Abnormal Traffic In SDN -- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth -- PPD-DL: Privacy-Preserving Decentralized Deep Learning -- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids -- Android Malware Identification Based on Traffic Analysis -- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary -- Research on the Efficiency and Application of Ship- helicopter Cooperative Search -- Cellular Neural Network Based Contour Detection for Seismic Image -- Discovering New Sensitive Words Based on Sensitive Information Categorization -- A Dynamic Event Region Tracking Approach Based on Node Calibration -- A Graph Updating Method of Data Theft Detection Based on Rough Set -- A Tutorial of Graph Representation -- Ground-based Cloud Images Recognition Based on GAN and PCANet -- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules -- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising -- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging -- DWI Fiber Tracking with Functional MRI of White Matter -- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm -- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network -- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI -- Convolutional Neural Networks for Scene Image Recognition -- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology -- Research on Detection Method of Unhealthy Message in Social Network -- Image Authentication by Single Target Region Detection -- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security -- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks -- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption -- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning -- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network -- A Novel Malware Detection and Classification Method Based on Capsule Network -- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition -- Implementation of MD5 Collision Attack in Program -- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm -- Monochromatic Mutual Nearest Neighbor Queries over Uncertain Data -- Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse -- Efficient PatchMatch-based Image Registration and Retargeting for Cartoon Animation.
Record Nr. UNINA-9910349309903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Artificial Intelligence and Security [[electronic resource] ] : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV / / edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 651 p. 252 illus., 134 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Application software
Software engineering
Computers
Law and legislation
Systems and Data Security
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Legal Aspects of Computing
ISBN 3-030-24268-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
Record Nr. UNISA-996466212103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui