top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications / / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari
Computational Intelligence in Digital Forensics: Forensic Investigation and Applications / / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 455 p. 170 illus., 12 illus. in color.)
Disciplina 006.3
Collana Studies in Computational Intelligence
Soggetto topico Computational intelligence
Computer security
Artificial intelligence
Computational Intelligence
Systems and Data Security
Artificial Intelligence
ISBN 3-319-05885-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Forensic Discovery and Investigation -- Intelligent Forensic Science Applications.
Record Nr. UNINA-9910299719203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pattern Analysis, Intelligent Security and the Internet of Things / / edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo
Pattern Analysis, Intelligent Security and the Internet of Things / / edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (356 p.)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Computational complexity
Artificial intelligence
Computational Intelligence
Complexity
Artificial Intelligence
ISBN 3-319-17398-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.
Record Nr. UNINA-9910299830703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui