找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Security in Intelligent Computing and Communications; Rajeev Agrawal,Jing He,Sanjeev Kumar Book 2022 The Editor(s) (if applicable) a

[复制链接]
查看: 46739|回复: 58
发表于 2025-3-21 18:19:27 | 显示全部楼层 |阅读模式
书目名称Cyber Security in Intelligent Computing and Communications
编辑Rajeev Agrawal,Jing He,Sanjeev Kumar
视频video
概述Provides immersed cyber security growing challenges with topical advancements.Includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology.Is a valuable r
丛书名称Studies in Computational Intelligence
图书封面Titlebook: Cyber Security in Intelligent Computing and Communications;  Rajeev Agrawal,Jing He,Sanjeev Kumar Book 2022 The Editor(s) (if applicable) a
描述.This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outcomes, and cyber security practices, threats, and attacks with challenges. The book begins with a state-of-the-art survey and reviews of cyber security trends and issues. It further covers areas such as developments in intelligent computing and communication, smart healthcare, agriculture, transportation, online education, and many more real-life applications using IoT, big data, cloud computing, artificial intelligence, data science, and machine learning. This book is of interest to graduate/postgraduate students, researchers, and academicians. This book will be a valuable resource for practitioners and professionals working in smart city visualization through secure and intelligent application design, development, deployment to foster digital revolution, and reliable integration of advanced computing and communication technologies with global significance..
出版日期Book 2022
关键词Authentication; Artificial Intelligence; Big Data; Cloud Computing; Cyber Security; Internet of Things (I
版次1
doihttps://doi.org/10.1007/978-981-16-8012-0
isbn_softcover978-981-16-8014-4
isbn_ebook978-981-16-8012-0Series ISSN 1860-949X Series E-ISSN 1860-9503
issn_series 1860-949X
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

书目名称Cyber Security in Intelligent Computing and Communications影响因子(影响力)




书目名称Cyber Security in Intelligent Computing and Communications影响因子(影响力)学科排名




书目名称Cyber Security in Intelligent Computing and Communications网络公开度




书目名称Cyber Security in Intelligent Computing and Communications网络公开度学科排名




书目名称Cyber Security in Intelligent Computing and Communications被引频次




书目名称Cyber Security in Intelligent Computing and Communications被引频次学科排名




书目名称Cyber Security in Intelligent Computing and Communications年度引用




书目名称Cyber Security in Intelligent Computing and Communications年度引用学科排名




书目名称Cyber Security in Intelligent Computing and Communications读者反馈




书目名称Cyber Security in Intelligent Computing and Communications读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:34:50 | 显示全部楼层
发表于 2025-3-22 00:27:21 | 显示全部楼层
https://doi.org/10.1007/978-1-4684-0126-4cations, description of the tools used for reconnaissance. The Open-Source Intelligence (OSINT) methodology involves specific methods of reconnaissance, gathering and analyzing information. Analysts need to have the tools that allow them to flexibly, tentatively and creatively generate foundations t
发表于 2025-3-22 07:40:14 | 显示全部楼层
发表于 2025-3-22 09:40:16 | 显示全部楼层
发表于 2025-3-22 15:09:26 | 显示全部楼层
Erwan Marchand,Michel Gagnon,Amal Zouaqrmation on the cloud. Hence it becomes a necessity to group the similar data in particular Clusters using data mining techniques and algorithms. And an unsupervised approach, clustering is used for grouping the instances. The present paper represents three different Cluster algorithms: Expectation M
发表于 2025-3-22 20:23:37 | 显示全部楼层
发表于 2025-3-22 21:20:51 | 显示全部楼层
https://doi.org/10.1007/978-3-030-55814-7n investments to the project. Rewards-based crowdfunding offers investors rewards based on the amount of money donated. Traditional Crowdfunding platforms involve intermediaries and result in processing fees levied on all transactions. This results in subsided capital for the beneficiary. Using a bl
发表于 2025-3-23 04:55:48 | 显示全部楼层
Erwan Marchand,Michel Gagnon,Amal Zouaqrown to be a not unusual scenario. The world goes to be digital by means of making the availability of services to peoples together with credit score playing cards, ATM, Internet banking, and mobile banking services. With the rapid increase of the e-trade or online business the use of credit card is
发表于 2025-3-23 09:22:42 | 显示全部楼层
Active Control of Flexible Structuresipt has many characters, including numerals and different shape variations of these characters. Moreover, the Hindi script also has compound characters as well as characters with modifiers. It makes the task of character recognition more complex. Even the shape of characters written by an individual
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 00:08
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表