libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

naik nitin (curatore); jenkins paul (curatore); prajapat shaligram (curatore); grace paul (curatore) - contributions presented at the international conference on computing, communication, cybersecurity and ai, july 3–4, 2024, london, uk
Zoom

Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3–4, 2024, London, UK The C3AI 2024

; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
237,98 €
NICEPRICE
226,08 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 12/2024





Trama

This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2024), held in London, UK, from July 3 to 4, 2024. The conference attracted 66 submissions from 17 countries, including the USA, UK, Canada, Brazil, India, China, Germany, and Spain. Of these, 47 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.





Sommario

Security model for IoT applications IoTSeMo.- DAN Deep Neural Network-based Application Mapping for Optimized Network-on-Chip Design.- Threat Modelling in  Virtual Assistant Hub Devices.- Generate Unnoticeable Adversarial Examples on Audio Classification Models with Multi perspective Objectives.- Prior enhanced Semi supervised Federated Learning for IoT Intrusion Detection A Game Theory and Comparative Learning based Approach.- An empirical study on Insider Threats Towards Crime Prevention through Environmental Design CPTED A student case study.- Utilizing Machine Learning and Deep Learning Techniques for the Detection of Distributed Denial of Service DDoS Attacks.- Inspecting software architecture design styles to infer threat models and inform likely attacks.











Altre Informazioni

ISBN:

9783031744426

Condizione: Nuovo
Collana: Lecture Notes in Networks and Systems
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:IX, 826 p. 335 illus., 280 illus. in color.
Pagine Arabe: 826
Pagine Romane: ix


Dicono di noi