This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions.
This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12-13 October 2019.
This book covers both basic and high-level concepts relating to the intelligent computing paradigm and data sciences in the context of distributed computing, big data, data sciences, high-performance computing and Internet of Things.
This book is a collection of the best research papers presented at the First World Conference on Internet of Things: Applications & Future (ITAF 2019), Sponsored by GR Foundation and French University in Egypt, held at Triumph Luxury Hotel, Cairo, Egypt, on 14-15 October 2019.
This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs).
This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains.
This Key Code and Handbook examines the corporate governance and accountability of Major Banks, their directors and executives which were the central focus of bank, Supervisor, Regulator and governmental activity and public scrutiny in 2018 and 2019.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and applications, and then introduces the cutting-edge research advances that make reinforcement learning capable of out-performing most state-of-art systems, and even humans in a number of applications.
This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30-31st August 2018.
This book includes high-quality, peer-reviewed research papers from the 6thInternational Conference on Innovations in Computer Science & Engineering (ICICSE 2018), held at Guru Nanak Institutions, Hyderabad, India from August 17 to 18, 2018.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'.
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference.
This book is the first one that comprehensively discusses cyberspace sovereignty in China, reflecting China's clear attitude in the global Internet governance: respecting every nation's right to independently choose a development path, cyber management modes and Internet public policies and to participate in the international cyberspace governance on an equal footing.
This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians.
The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives.
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges.
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth.
The book features research papers presented at the International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2018), offering significant contributions from researchers and practitioners in academia and industry.
The book is a collection of high-quality peer-reviewed research papers presented at the Fifth International Conference on Innovations in Computer Science and Engineering (ICICSE 2017) held at Guru Nanak Institutions, Hyderabad, India during 18-19 August 2017.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This book presents conjectural advances in big data analysis, machine learning and computational intelligence, as well as their potential applications in scientific computing.
The volume deals with sustainability transitions which are transformations of major socio-technical systems of provision and use in areas such as energy, water, mobility, and food, towards more sustainable ways of production and consumption.
This book addresses the emerging area of cloud computing, providing a comprehensive overview of the research areas, recent work and open research problems.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016.