Muutke küpsiste eelistusi

Security and Management and Wireless Networks: 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 2225, 2024, Revised Selected Papers [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 646 pages, kõrgus x laius: 235x155 mm, 173 Illustrations, color; 68 Illustrations, black and white; XIX, 646 p. 241 illus., 173 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2254
  • Ilmumisaeg: 27-Apr-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031866363
  • ISBN-13: 9783031866364
  • Pehme köide
  • Hind: 85,76 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 100,89 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 646 pages, kõrgus x laius: 235x155 mm, 173 Illustrations, color; 68 Illustrations, black and white; XIX, 646 p. 241 illus., 173 illus. in color., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 2254
  • Ilmumisaeg: 27-Apr-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031866363
  • ISBN-13: 9783031866364

This book constitutes the proceedings of the 23rd International Conference on Security and Management, SAM 2024, and the 23rd International Conference on Wireless Networks, ICWN 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.

For SAM 2024, 255 submissions have been received and 40 papers have been accepted for publication in these proceedings; the 12 papers included from IWCN 2024 have been carefully reviewed and selected from 66 submissions. They have been organized in topical sections as follows: Intrusion and attack detection: malware, malicious URL, phishing; security assessment and management + blockchain + use of artificial intelligence; cybersecurity and communications systems + cryptography and privacy; security and management + new methodologies and applications; wireless networks and mobile computing.

Intrusion and attack detection: malware, malicious URL, phishing.-
security assessment and management + blockchain + use of artificial
intelligence.- cybersecurity and communications systems + cryptography and
privacy.- security and management + new methodologies and applications.-
wireless networks and mobile computing.