The book presents high quality research papers presented at International Conference on Computational Intelligence (ICCI 2020) held at Indian Institute of Information Technology, Pune, India during 12-13 December, 2020.
This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur.
This book gathers a collection of high-quality peer-reviewed research papers presented at First International Conference on Innovations in Software Architecture and Computational Systems (ISACS 2021), held at Guru Nanak Institute of Technology, Kolkata, India, during 2 - 3 April 2021.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains.
This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30-31st August 2018.
This book includes high-quality, peer-reviewed research papers from the 6thInternational Conference on Innovations in Computer Science & Engineering (ICICSE 2018), held at Guru Nanak Institutions, Hyderabad, India from August 17 to 18, 2018.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.
This unique compendium focuses on the design and implementation of emerging transport protocols and task scheduling mechanisms to mitigate congestion in datacentre networks.
The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives.
This book introduces the basic theory and key technologies of MIMO multi-antenna system, the characteristics and applications of spatial multi-dimensional cooperative transmission in the Ground-based, Air-based and Space-based communication systems as well as several advanced technologies for spatial multidimensional cooperative transmission from theoretical and practical perspectives.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth.
The book features research papers presented at the International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2018), offering significant contributions from researchers and practitioners in academia and industry.
The book is a collection of high-quality peer-reviewed research papers presented at the Fifth International Conference on Innovations in Computer Science and Engineering (ICICSE 2017) held at Guru Nanak Institutions, Hyderabad, India during 18-19 August 2017.
This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing.
The volume deals with sustainability transitions which are transformations of major socio-technical systems of provision and use in areas such as energy, water, mobility, and food, towards more sustainable ways of production and consumption.
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 - 23 July 2016.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016).
This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target.
This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications.
This book presents original, peer-reviewed select articles from the International Conference on Cognitive & Intelligent Computing (ICCIC - 2021), held on December 11-12, 2021, at Hyderabad, India.
Utilizando un lenguaje claro y didáctico el presente libro tiene como objetivo dotar al lector de los conocimientos necesarios para establecer y definir las líneas de actuación ante incidentes de ciberseguridad implantando los controles y los mecanismos necesarios para su monitorización e identificación, así como las líneas de actuación a seguir, como son:- La detección de incidentes mediante distintas herramientas de monitorización.
Este libro es una guía práctica destinada a adquirir las competencias digitales básicas que permitan "aprovechar la riqueza de las nuevas posibilidades asociadas a las tecnologías digitales" y las competencias clave para el aprendizaje permanente.
El propósito de esta obra es transmitir a los equipos responsables de la ciberseguridad, estudiantes y profesionales del sector una visión completa de las características y alcance de la ciberseguridad cuando se persigue proteger activos industriales o que prestan servicios esenciales.
En las estructuras de datos dinámicas el tamaño y su forma es variable a lo largo de un programa, es decir, la memoria se reserva a tiempo de corrida del programa; este tipo de estructuras está conformada por nodos, los cuales tienen como mínimo dos campos: uno de información (clientes, pasajeros, cuenta bancaria, entre otros) y otro que contiene la referencia del siguiente nodo; los nodos se crean y destruyen en tiempo de ejecución.