找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security with Intelligent Computing and Big-Data Services 2019; Proceedings of the 3 Lakhmi C. Jain,Sheng-Lung Peng,Shiuh-Jeng Wang Confere

[复制链接]
查看: 28741|回复: 53
发表于 2025-3-21 16:26:41 | 显示全部楼层 |阅读模式
书目名称Security with Intelligent Computing and Big-Data Services 2019
副标题Proceedings of the 3
编辑Lakhmi C. Jain,Sheng-Lung Peng,Shiuh-Jeng Wang
视频video
概述Includes recent research on Cyber-Security with Intelligent Computing and Big-Data Services.Presents the proceedings of the Research track of the 3rd International Conference on Security with Intellig
丛书名称Advances in Intelligent Systems and Computing
图书封面Titlebook: Security with Intelligent Computing and Big-Data Services 2019; Proceedings of the 3 Lakhmi C. Jain,Sheng-Lung Peng,Shiuh-Jeng Wang Confere
描述This book aims to attract researchers and practitioners who are working in Information Technology and Computer Science. This edited book is about basics and high level concepts regarding Blockchain Technology and Application, Multimedia Security, Information Processing, Security of Network, Cloud and IoT, Cryptography and Cryptosystem, Learning and Intelligent Computing, Information Hiding. It is becoming increasingly important to develop adaptive, intelligent computing-centric, energy-aware, secure and privacy-aware mechanisms in high performance computing and IoT applications. The book serves as a useful guide for industry persons and also helps beginners to learn things from basic to advance in the area of better computing paradigm. Our aim is intended to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results in security related areas. We believe that this volume not only presents novel and interesting ideas but also will stimulate interesting discussions from the participants and inspire new ideas. 
出版日期Conference proceedings 2020
关键词Cyber-security; Intelligent Computing; Evidence Investigations; Big-data Services; SICBS 2019
版次1
doihttps://doi.org/10.1007/978-3-030-46828-6
isbn_softcover978-3-030-46827-9
isbn_ebook978-3-030-46828-6Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer Nature Switzerland AG 2020
The information of publication is updating

书目名称Security with Intelligent Computing and Big-Data Services 2019影响因子(影响力)




书目名称Security with Intelligent Computing and Big-Data Services 2019影响因子(影响力)学科排名




书目名称Security with Intelligent Computing and Big-Data Services 2019网络公开度




书目名称Security with Intelligent Computing and Big-Data Services 2019网络公开度学科排名




书目名称Security with Intelligent Computing and Big-Data Services 2019被引频次




书目名称Security with Intelligent Computing and Big-Data Services 2019被引频次学科排名




书目名称Security with Intelligent Computing and Big-Data Services 2019年度引用




书目名称Security with Intelligent Computing and Big-Data Services 2019年度引用学科排名




书目名称Security with Intelligent Computing and Big-Data Services 2019读者反馈




书目名称Security with Intelligent Computing and Big-Data Services 2019读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:44:30 | 显示全部楼层
发表于 2025-3-22 00:50:34 | 显示全部楼层
发表于 2025-3-22 06:36:39 | 显示全部楼层
发表于 2025-3-22 11:41:36 | 显示全部楼层
发表于 2025-3-22 16:52:20 | 显示全部楼层
Impact of Big Data Analytics Capability and Strategic Alliances on Financial Performance framework that conceptualizes multifaceted antecedents pertaining to financial performance of Taiwan’s industry relation to big data analytics capability and strategic alliances. However, due to the limited amount of samples taken, those study results would be biased. Therefore, this study applied
发表于 2025-3-22 17:43:43 | 显示全部楼层
A Progressive Secret Image Sharing Scheme Based on GEMD Data Hidingtal information be tampered with to keep the security of data is the most important thing today. The main method of data hiding is to embed secret information into multimedia and then transmit it to the recipient. The stego multimedia would not attract someone and is protected from tampering during
发表于 2025-3-23 00:57:08 | 显示全部楼层
Device Discovery Techniques for Industrial Internet of Things Through Predictive Analytic Mechanismis to be gathered first to accomplish the effective management of the machine in an industry. This collected data provides the current status of the machine and eventually helps in predicting the machine failures beforehand. These sequences of events are called predictive maintenance of a machine. T
发表于 2025-3-23 03:06:27 | 显示全部楼层
发表于 2025-3-23 07:23:31 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 02:45
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表