Muutke küpsiste eelistusi

E-raamat: Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3-4, 2024, London, UK: The C3AI 2024

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 246,99 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book offers an in-depth exploration of cutting-edge research across the interconnected fields of computing, communication, cybersecurity, and artificial intelligence. It serves as a comprehensive guide to the technologies shaping our digital world, providing both a profound understanding of these domains and practical strategies for addressing their challenges. The content is drawn from the International Conference on Computing, Communication, Cybersecurity and AI (C3AI 2024), held in London, UK, from July 3 to 4, 2024. The conference attracted 66 submissions from 17 countries, including the USA, UK, Canada, Brazil, India, China, Germany, and Spain. Of these, 47 high-calibre papers were rigorously selected through a meticulous review process, where each paper received three to four reviews to ensure quality and relevance. This book is an essential resource for readers seeking a thorough and timely review of the latest advancements and trends in computing, communication, cybersecurity, and artificial intelligence.

Security model for IoT applications IoTSeMo.- DAN Deep Neural
Network-based Application Mapping for Optimized Network-on-Chip Design.-
Threat Modelling in  Virtual Assistant Hub Devices.- Generate Unnoticeable
Adversarial Examples on Audio Classification Models with Multi perspective
Objectives.- Prior enhanced Semi supervised Federated Learning for IoT
Intrusion Detection A Game Theory and Comparative Learning based Approach.-
An empirical study on Insider Threats Towards Crime Prevention through
Environmental Design CPTED A student case study.- Utilizing Machine Learning
and Deep Learning Techniques for the Detection of Distributed Denial of
Service DDoS Attacks.- Inspecting software architecture design styles to
infer threat models and inform likely attacks.