top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
B C, Before Computers : On Information Technology from Writing to the Age of Digital Data
B C, Before Computers : On Information Technology from Writing to the Age of Digital Data
Autore Robertson Stephen
Pubbl/distr/stampa Open Book Publishers, 2020
Descrizione fisica 1 electronic resource (170 p.)
Soggetto topico Computing & information technology
Information theory
Educational equipment & technology, computer-aided learning (CAL)
Biography & True Stories
Information technology: general issues
Soggetto non controllato history of computer developments
digital age
computer
information technology revolution
data processing
cryptography
visual art
music
postal system
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti B C, Before Computers
Record Nr. UNINA-9910688420203321
Robertson Stephen  
Open Book Publishers, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and Its Applications in Information Security
Cryptography and Its Applications in Information Security
Autore Assad Safwan El
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 online resource (202 p.)
Soggetto topico History of engineering & technology
Technology: general issues
Soggetto non controllato 3D chebyshev
asymmetric
asymmetric algorithm
authorization model
bit independence
bit independence criterion
blockchain
chaos-based stream cipher
communication
complexity
computationally biased
coupled map lattice
cryptography
digital cash
digital copyright management
federated learning
FPGA
framework
homomorphic encryption
intermittent jumping
intrusion detection systems
limited computational power
logistic
machine learning
multi-chaos
museum
n/a
performance
privacy
privacy preserving
public key exchange
RC4
security
skew-tent
smart contract
SPCNG
stream cipher
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910566470303321
Assad Safwan El  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Cyber Security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers
Autore Lu Wei
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 electronic resource (239 p.)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Artificial intelligence
Legal aspects of IT
Network security
Soggetto non controllato application service layer
artificial intelligence
communication systems
computer crime
computer networks
computer security
computer systems
cryptography
cyber security
data communication systems
data security
databases
machine learning
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996503561903316
Lu Wei  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers
Autore Lu Wei
Pubbl/distr/stampa Singapore, : Springer Nature, 2022
Descrizione fisica 1 online resource (234 pages)
Altri autori (Persone) ZhangYuqing
WenWeiping
YanHanbing
LiChao
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer networking & communications
Coding theory & cryptology
Network security
Artificial intelligence
Software Engineering
Soggetto non controllato artificial intelligence
authentication
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data mining
data security
databases
information retrieval
network protocols
network security
privacy
signal processing
telecommunication networks
telecommunication systems
ISBN 981-16-9229-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464545403316
Lu Wei  
Singapore, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Cyber Security [[electronic resource] ] : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers / / edited by Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou
Autore Lu Wei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Springer Nature, 2020
Descrizione fisica 1 online resource (X, 235 p. 108 illus., 70 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Application software
Architecture, Computer
Data encryption (Computer science)
Computer networks - Security measures
Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Soggetto non controllato Systems and Data Security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer System Implementation
Cryptology
Mobile and Network Security
Data and Information Security
Computer and Information Systems Applications
communication channels (information theory)
communication systems
computer crime
computer hardware
computer networks
computer security
computer systems
cryptography
data communication systems
data security
databases
network protocols
network security
sensors
signal processing
telecommunication networks
telecommunication systems
telecommunication traffic
wireless telecommunication systems
Network hardware
Information retrieval
Internet searching
Systems analysis & design
Coding theory & cryptology
Data encryption
ISBN 981-334-922-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access Control -- Cryptography -- Denial-of-Service Attacks -- Hardware Security Implementation -- Intrusion/Anomaly Detection and Malware Mitigation -- Social Network Security and Privacy.-Systems Security.
Record Nr. UNISA-996465362903316
Lu Wei  
Springer Nature, 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Cybersecurity of digital service chains : challenges, methodologies, and tools / / editors, Joanna Kołodziej, Matteo Repetto, Armend Duzha
Autore Kołodziej Joanna
Pubbl/distr/stampa Cham, : Springer International Publishing AG, 2022
Descrizione fisica 1 online resource (xi, 257 pages) : illustrations (chiefly color)
Altri autori (Persone) RepettoMatteo
DuzhaArmend
Collana Lecture notes in computer science
Soggetto topico Business - Data processing - Security measures
Computer networks - Security measures
Soggetto non controllato cloud computing
computer crime
computer networks
computer security
cryptography
cyber security
data communication systems
data flow architectures
data management systems
data security
electromagnetic interference and compatibility
general programming languages
health informatics
intrusion detection
network protocols
network security
network simulations
sensors and actuators
signal processing
telecommunication traffic
ISBN 3-031-04036-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reference Architecture for Management of Security Operations in Digital Service Chains Efficient flow monitoring in digital services Intelligent Transportation Systems models, challenges, security aspects NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic Detecting unknown attacks through system behavior analysis Signature-based detection of botnet DDoS attacks Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation Blockchain-based task and information management in computational cloud systems
Record Nr. UNISA-996472069303316
Kołodziej Joanna  
Cham, : Springer International Publishing AG, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
Autore Kheyfits Alexander I
Pubbl/distr/stampa Bloomfield : , : Mercury Learning & Information, , 2021
Descrizione fisica 1 online resource (382 pages)
Disciplina 510
Soggetto topico COMPUTERS / Security / Cryptography
Soggetto non controllato computer science
cryptography
discrete math
finite
mathematics
ISBN 1-68392-761-3
1-68392-762-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Contents -- Preface -- Chapter 1: A Brief Survey of Elementary Functions -- Chapter 2: Propositional Algebra -- Chapter 3: Naïve and Formal (Axiomatic) Set Theory -- Chapter 4: Groups, Rings, and Fields -- Chapter 5: Predicates and Quantifiers—Algebraic Theory -- Chapter 6: Binary Relations and Relational Databases -- Chapter 7: Combinatorics -- Chapter 8: Elements of Number Theory -- Chapter 9: Boolean Functions -- Chapter 10: Hashing Functions and Cryptographic Maps -- Chapter 11: Generating Polynomials and Inversion Formulas -- Chapter 12: Systems of Representatives -- Chapter 13: Boolean Algebras -- Chapter 14: Combinatorial Circuits -- Chapter 15: Complete Systems of Boolean Functions and Bases -- Chapter 16: Introductory Graph Theory, Euler’s Formula, and Unbreakable Ciphers -- Chapter 17: Trees and Digraphs -- Chapter 18: Computations and Algorithms -- Chapter 19: Finite Automata -- Chapter 20: Introduction to Game Theory -- Chapter 21: Information Theory and Coding -- Chapter 22: Probability Theory with a Finite Sample Space and the Birthday Problem -- Chapter 23: Turing Machines, P and NP Classes, and Other Models of Computation -- Chapter 24: Answers and Solutions to Selected Exercises -- Bibliography -- Index
Altri titoli varianti Discrete Mathematics with Cryptographic Applications
Record Nr. UNINA-9910794790503321
Kheyfits Alexander I  
Bloomfield : , : Mercury Learning & Information, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
Discrete Mathematics with Cryptographic Applications : A Self-Teaching Introduction
Autore Kheyfits Alexander I
Pubbl/distr/stampa Bloomfield : , : Mercury Learning & Information, , 2021
Descrizione fisica 1 online resource (382 pages)
Disciplina 510
Soggetto topico COMPUTERS / Security / Cryptography
Soggetto non controllato computer science
cryptography
discrete math
finite
mathematics
ISBN 1-68392-761-3
1-68392-762-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Contents -- Preface -- Chapter 1: A Brief Survey of Elementary Functions -- Chapter 2: Propositional Algebra -- Chapter 3: Naïve and Formal (Axiomatic) Set Theory -- Chapter 4: Groups, Rings, and Fields -- Chapter 5: Predicates and Quantifiers—Algebraic Theory -- Chapter 6: Binary Relations and Relational Databases -- Chapter 7: Combinatorics -- Chapter 8: Elements of Number Theory -- Chapter 9: Boolean Functions -- Chapter 10: Hashing Functions and Cryptographic Maps -- Chapter 11: Generating Polynomials and Inversion Formulas -- Chapter 12: Systems of Representatives -- Chapter 13: Boolean Algebras -- Chapter 14: Combinatorial Circuits -- Chapter 15: Complete Systems of Boolean Functions and Bases -- Chapter 16: Introductory Graph Theory, Euler’s Formula, and Unbreakable Ciphers -- Chapter 17: Trees and Digraphs -- Chapter 18: Computations and Algorithms -- Chapter 19: Finite Automata -- Chapter 20: Introduction to Game Theory -- Chapter 21: Information Theory and Coding -- Chapter 22: Probability Theory with a Finite Sample Space and the Birthday Problem -- Chapter 23: Turing Machines, P and NP Classes, and Other Models of Computation -- Chapter 24: Answers and Solutions to Selected Exercises -- Bibliography -- Index
Altri titoli varianti Discrete Mathematics with Cryptographic Applications
Record Nr. UNINA-9910826507003321
Kheyfits Alexander I  
Bloomfield : , : Mercury Learning & Information, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Electronic Voting : 7th International Joint Conference, e-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings
Autore Krimmer Robert
Pubbl/distr/stampa Cham, : Springer Nature, 2022
Descrizione fisica 1 online resource (197 pages)
Altri autori (Persone) VolkamerMelanie
Duenas-CidDavid
RønnePeter
GermannMicha
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory & cryptology
Information retrieval
Artificial intelligence
Network security
Computer security
Network hardware
Soggetto non controllato artificial intelligence
communication
communication systems
computer crime
computer hardware
computer networks
computer science
computer security
computer systems
computer vision
cryptography
data security
engineering
fuzzy sets
internet
network protocols
network security
privacy
signal processing
telecommunication systems
ISBN 3-031-15911-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996490356403316
Krimmer Robert  
Cham, : Springer Nature, 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Entropy in Image Analysis II
Entropy in Image Analysis II
Autore Sparavigna Amelia Carolina
Pubbl/distr/stampa Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020
Descrizione fisica 1 online resource (394 p.)
Soggetto topico History of engineering and technology
Soggetto non controllato AMBTC
art history
art statistics
atmosphere background
backscattered signals
balance
bit cube
blind image quality assessment
brain-computer interface (BCI)
chaotic system
chaotic systems
chiaroscuro
children
chosen plaintext attack
complexity
compound chaotic system
computer vision
continuous wavelet transform (CWT)
convolution neural network
convolutional neural network
convolutional neural network (CNN)
crowd behavior analysis
crowd motion detection
cryptography
data expansion
data hiding
declining quality
deep neural network
detectability
dictionary-based coding
diffusion
direction entropy
DNA coding
DNA computing
Duchenne muscular dystrophy
electroencephalography (EEG)
engine flame
entropy
feature distribution entropy
feature fusion
filtering
Golomb-Rice codes
human visual system
hyperchaotic system
image binarization
image chaotic encryption
image encryption
image entropy
image information entropy
image preprocessing
image processing
image quality evaluation
image retrieval
image segmentation
infrared radiation
IoU
Keras
key space calculation
key-point detection
Latin cube
local entropy filter
lossless compression
machine learning
magnetic resonance images
malaria infection
medical color images
medical image
medical imaging
Mordell elliptic curve
motor imagery (MI)
MXNet
neural engineering
neuroaesthetics
node strength
non-maximum suppression
normalized entropy
nuclear spin generator
object detection
optical character recognition
pattern classification
peak signal-to-noise ratio
pixel value adjusting
Pompe disease
pooling method
portrait paintings
pseudo-random numbers
Python
quantitative muscle ultrasound
quasi-resonant Rossby/drift wave triads
renaissance
repulsive force
RGB
RSNNS
S-box
saliency and distortion
salient crowd motion detection
security
security analysis
steganography
stego image
substitution box
symmetry
texture-feature parametric imaging
thresholding
ultrasound
weld evaluation
weld segmentation
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910557433403321
Sparavigna Amelia Carolina  
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui