Computational Intelligence in Digital Forensics: Forensic Investigation and Applications / / edited by Azah Kamilah Muda, Yun-Huoy Choo, Ajith Abraham, Sargur N. Srihari |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 455 p. 170 illus., 12 illus. in color.) |
Disciplina | 006.3 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Computer security Artificial intelligence Computational Intelligence Systems and Data Security Artificial Intelligence |
ISBN | 3-319-05885-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Forensic Discovery and Investigation -- Intelligent Forensic Science Applications. |
Record Nr. | UNINA-9910299719203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Pattern Analysis, Intelligent Security and the Internet of Things / / edited by Ajith Abraham, Azah Kamilah Muda, Yun-Huoy Choo |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (356 p.) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Computational complexity Artificial intelligence Computational Intelligence Complexity Artificial Intelligence |
ISBN | 3-319-17398-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Bridging Creativity and Group by Elements of Problem-Based Learning (PBL) -- Password Recovery Using Graphical Method -- An Classification on Brainwave Patterns for Parkinson Patients Using WEKA -- An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources -- A study on changes of supervision model in universities and fostering creative Ph.D. students in China -- Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis -- Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation -- Can Single- Sign-On Improve Password Management? A Focus Group Study -- The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review -- Finding the Effectiveness of Software Team Members Using Decision Tree -- Data Completeness Measures -- Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic -- The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan -- A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values -- The Impact of Knowledge Management in Pair Programming on Program Quality -- Social Networks Event Mining: A Systematic Literature Review -- Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature -- Social Networks Content Analysis for Peacebuilding Application -- Tree-base Structure for Feature Selection in Writer Identification -- Factors That Affecting The Effective Online Collaborative Learning Environment -- Comparing Features Extraction Methods for Person Authentication using EEG Signals -- A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification -- Risk assessment for Grid computing using Meta learning Ensembles -- Modeling Cloud Computing Risk Assessment Using Ensemble Methods -- Design Consideration for Improved Term Weighting Scheme for Pornographic Websites -- A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings -- An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves -- Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory -- Category-based Graphical User Authentication (CGUA) Scheme for Web Application -- An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves -- A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment -- A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins. |
Record Nr. | UNINA-9910299830703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|