This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains.
This Key Code and Handbook examines the corporate governance and accountability of Major Banks, their directors and executives which were the central focus of bank, Supervisor, Regulator and governmental activity and public scrutiny in 2018 and 2019.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and applications, and then introduces the cutting-edge research advances that make reinforcement learning capable of out-performing most state-of-art systems, and even humans in a number of applications.
This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30-31st August 2018.
This book includes high-quality, peer-reviewed research papers from the 6thInternational Conference on Innovations in Computer Science & Engineering (ICICSE 2018), held at Guru Nanak Institutions, Hyderabad, India from August 17 to 18, 2018.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.
This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians.
The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives.
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth.
The book features research papers presented at the International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2018), offering significant contributions from researchers and practitioners in academia and industry.
The book is a collection of high-quality peer-reviewed research papers presented at the Fifth International Conference on Innovations in Computer Science and Engineering (ICICSE 2017) held at Guru Nanak Institutions, Hyderabad, India during 18-19 August 2017.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing.
The volume deals with sustainability transitions which are transformations of major socio-technical systems of provision and use in areas such as energy, water, mobility, and food, towards more sustainable ways of production and consumption.
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016.
The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 - 23 July 2016.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016).
This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.
Healthcare-Driven Intelligent Computing Paradigms to Secure Futuristic Smart Cities presents the applications of the healthcare sector in the context of futuristic smart cities.