Arama Sonuçları - (((( less composer ) OR ( loss composer ))) OR ((( hess computer ) OR ( threats computer ))))*
Önerilen Konular
Önerilen Konular
- Data protection 27
- Data and Information Security 26
- Telecommunication 24
- Communications Engineering, Networks 23
- Computational Intelligence 23
- Computational intelligence 23
- Security Science and Technology 16
- Security systems 16
- Artificial Intelligence 13
- Artificial intelligence 13
- Electronic Circuits and Systems 13
- Electronic circuits 13
- Signal processing 11
- Signal, Speech and Image Processing 11
- Computer networks 10
- Computer Communication Networks 9
- Computer architecture 7
- Electronics 7
- Electronics and Microelectronics, Instrumentation 7
- Microprocessors 7
- Processor Architectures 7
- Social aspects 6
- Application software 5
- Computer and Information Systems Applications 5
- Computer crimes 5
- Cybercrime 5
- Data Mining and Knowledge Discovery 5
- Data mining 5
- Ethnology 5
- Methodology 5
-
1
Information Security Practices Emerging Threats and Perspectives /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
2
Handbook of Contact Mechanics Exact Solutions of Axisymmetric Contact Problems /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
3
Computer and Network Security Essentials
Baskı/Yayın Bilgisi 2018İçindekiler: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
4
-
5
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2018İçindekiler: “…Virtual Experimental Analysis of Redundant Robot Manipulators using Neural Networks -- Selection of Energy Efficient Material: an Entropy-TOPSIS Approach -- Analyses & Detection of Health Insurance Fraud Using Data Mining & Predictive Modeling Techniques -- Software Cost Estimation Using Artificial Neural Network -- A Three Layer Approach for Overlay Text Extraction in Video Stream -- Recognition of Noisy Numbers Using Neural Network -- Secure Group Authentication Scheme for LTE-Advanced -- Frequency Fractal Behaviour in the Retina Nano Centre- Fed Dipole Antenna Network of a Human Eye -- Trigonometric Probability Tuning in Asynchronous Differential Evolution -- Analytical review on Image Compression using Fractal Image Coding -- The Fulcrum principle between Parasympathetic and Sympathetic peripheral systems: Auditory noise can modulate body's peripheral temperature -- Improved Clustering Algorithm for Wireless Sensor Network -- Fuzzy based probabilistic ecological risk assessment approach: Acase study of heavy metal contaminated soil -- Performance Comparisons of Four Modified Structures of Log Periodic Three Element Microstrip Antenna Arrays -- Preliminary Study of Ecommerce Adoption in Indian Handicraft SME: A Case Study -- Threat Detection for Software Vulnerability using DE based Adaptive Approach -- Methods to choose the 'Best-fit' Patch in Patch-Based Texture Synthesis Algorithm -- Revisiting Requirements Analysis Techniques and Challenges -- Speech Recognition with Combined MFCC, MODGDF and ZCPA Features Extraction techniques using NTN and MNTN conventional Classifiers for Telugu language -- Real Time Sentiment Analysis of Big Data Applications Using Twitter Data with Hadoop Framework -- Addressing Security concerns for Infrastructure of Cloud Computing.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
6
Secure System Design and Trustable Computing
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
7
Recent Advances in Computational Intelligence in Defense and Security
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
8
Security and Data Storage Aspect in Cloud Computing
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
9
Cloud Computing and Big Data: Technologies, Applications and Security
Baskı/Yayın Bilgisi 2019İçindekiler: “…Elliptic Curve Qu-Vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage -- Cloud Computing: Overview and Risk Identification Based on Classification by Type -- Authentication Model for Mobile Cloud Computing Database Service -- FADETPM: Novel Approach of File Assured Deletion Based on Trusted Platform Module -- Issues and Threats of Cloud Data Storage -- Challenges of Crowd Sensing for Cost-effective Data Management in the Cloud -- On the Security of Medical Image Processing in Cloud Environment -- Implementations of Intrusion Detection Architectures in Cloud Computing -- Privacy in Big Data Through Variable t-Closeness for MSN Attributes -- The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment -- Optimizations in Fully Homomorphic Encryption -- Support Cloud SLA establishment using MDE -- A New Parallel and Distributed Approach for Large Scale ImagesRetrieval -- Classification of Social Network Data Using a Dictionary-Based Approach -- Parallel and Distributed Map-Reduce Models for External Clustering Validation Indexes -- Workflow Scheduling Issues and Techniques in Cloud Computing: A Systematic Literature Review -- A Review of Green Cloud Computing Techniques -- Towards a smart exploitation of GPUs for low energy motion estimation using Full HD and 4K Videos -- Machine Learning applications in supply chains: Long Short-Term Memory for demand forecasting -- Performance Analysis of Preconditioned Conjugate Gradient Solver on Heterogeneous (Multi-CPUs/Multi-GPUs) Architecture -- Runtime prediction of optimizers using improved support vector machine -- AND/OR directed graph for dynamic web service composition -- An NLP based text-to-speech synthesizer for Moroccan Arabic -- Context-Aware Routing Protocol for Mobile WSN : Fire Forest Detection. .…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Addressing the Challenges of IGBO Computational Morphological Studies Using Frequent Pattern-Based Induction -- 12. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
11
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Novel Filtering-based Approach using Fuzzy Logic for Prevention of Adversaries in Sensory Application -- Game-Decision Model for Isolating Intruder & bridging Tradeoff between Energy and Security -- Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network -- An Efficient Approach towards Formal Verification of Mixed Signals using Feed-Forward Neural Network -- PCCV: Parallel Cancellation and Convolution Viterbi encoding/decoding approach for MIMO-OFDMA for efficient resource allocation and power consumption -- Streaming Analytics - Real-time Customer Satisfaction in Brick-And-Mortar Retailing -- An Efficient Mechanism to Improve the Complexity and System Performance in OFDM using Switched Beam Smart Antenna -- Modeling the Engineering Process as a Thinging Machine: A Case Study of Chip Manufacturing -- A Simple and Cost-Effective Anomaly Detection Paradigm on the Basis of Computational Intelligence for Mobile Ad-hoc Networks from a Security Viewpoint -- A Technique of Adaptation of the Workload Distribution Problem Model for the Fog-Computing Environment.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
12
-
13
-
14
-
15
-
16
-
17
Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach /
Baskı/Yayın Bilgisi 2017Full-text access
OPAC'ta görüntüle
e-Kitap -
18
The NICE Cyber Security Framework Cyber Security Intelligence and Analytics /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
19
Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach /
Baskı/Yayın Bilgisi 2016Full-text access
OPAC'ta görüntüle
e-Kitap -
20
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…Chapter 1. Cloud Computing Technology as an Auto Filtration System for Cost Reduction while Roaming -- Chapter 2. …”
Full-text access
OPAC'ta görüntüle
e-Kitap