Chronologie aller Bände (1 - 19)

Die Reihenfolge beginnt mit dem eBook "Blockchain for Construction". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Sukanta Kumar Sabut beginnen. Der zweite Teil der Reihe "Frontiers in Cyber Security" ist am 28.02.2022 erschienen. Mit insgesamt 19 Bänden wurde die Reihe über einen Zeitraum von ungefähr 5 Jahren fortgesetzt. Der neueste Band trägt den Titel "Information Security, Privacy and Digital Forensics".
- Anzahl der Bewertungen für die gesamte Reihe: 0
- Ø Bewertung der Reihe: 0
- Start der Reihe: 02.04.2021
- Neueste Folge: 18.12.2025
Diese Reihenfolge enthält 16 unterschiedliche Autoren.
- Autor: Dounas, Theodoros
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 20.09.2022
- Genre: Sonstiges
Blockchain for Construction
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry. Construction remains a fragmented change-resistant industry with chronic problems of underproductivity and a very low digitization factor compared to other fields. In parallel, the convergence, embedding and coordination of digital technologies in the physical world provides a unique opportunity for the construction industry to leap ahead and adopt fourth industrial revolution technologies. Within this context, B/DLT are an excellent fit for the digitization of the construction industry. B/DLT are effective in this as they organize and align digital and physical supply chains, produce stigmergic coordination out of decentralization, enable the governance of complex projects for multiple stakeholders, while enabling the creation of a new class of business models and legal instruments for construction.
- Autor: Zhang, Chuan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 05.04.2023
- Genre: Sachbuch
Privacy-Preserving in Mobile Crowdsensing
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices. Commonly, individuals are incentivized to collect data to fulfill a crowdsensing task released by a data requester. This “sensing as a service” elaborates our knowledge of the physical world by opening up a new door of data collection and analysis. However, with the expansion of mobile crowdsensing, privacy issues urgently need to be solved.
In this book, we discuss the research background and current research process of privacy protection in mobile crowdsensing. In the first chapter, the background, system model, and threat model of mobile crowdsensing are introduced. The second chapter discusses the current techniques to protect user privacy in mobile crowdsensing. Chapter three introduces the privacy-preserving content-based task allocation scheme. Chapter fourfurther introduces the privacy-preserving location-based task scheme. Chapter five presents the scheme of privacy-preserving truth discovery with truth transparency. Chapter six proposes the scheme of privacy-preserving truth discovery with truth hiding. Chapter seven summarizes this monograph and proposes future research directions.
In summary, this book introduces the following techniques in mobile crowdsensing: 1) describe a randomizable matrix-based task-matching method to protect task privacy and enable secure content-based task allocation; 2) describe a multi-clouds randomizable matrix-based task-matching method to protect location privacy and enable secure arbitrary range queries; and 3) describe privacy-preserving truth discovery methods to support efficient and secure truth discovery. These techniques are vital to the rapid development of privacy-preserving in mobile crowdsensing.
- Autor: Geng, Yu
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 29.08.2024
- Genre: Sonstiges
Practical Machine Learning Illustrated with KNIME
This book guides professionals and students from various backgrounds to use machine learning in their own fields with low-code platform KNIME and without coding. Many people from various industries need use machine learning to solve problems in their own domains. However, machine learning is often viewed as the domain of programmers, especially for those who are familiar with Python. It is too hard for people from different backgrounds to learn Python to use machine learning. KNIME, the low-code platform, comes to help. KNIME helps people use machine learning in an intuitive environment, enabling everyone to focus on what to do instead of how to do.
This book helps the readers gain an intuitive understanding of the basic concepts of machine learning through illustrations to practice machine learning in their respective fields. The author provides a practical guide on how to participate in Kaggle completions with KNIME to practice machine learning techniques.
- Autor: Gohil, Bhavesh N.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 18.12.2025
- Genre: Sonstiges
Information Security, Privacy and Digital Forensics
This volume contains the selected proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2023). The content highlights novel contributions and recent developments in areas such as cyber-attacks and defenses, computer forensics, cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, and hardware security, among others. This volume will serve as a valuable resource for researchers in both industry and academia who are working in the fields of security, privacy, and digital forensics from both technological and social perspectives.
- Band: 728
- Autor: Sabut, Sukanta Kumar
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 02.04.2021
- Genre: Sonstiges
Proceedings of International Conference on Communication, Circuits, and Systems
- Band: 1557
- Autor: Wang, Guojun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.02.2022
- Genre: Krimi
Ubiquitous Security
The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
- Band: 1558
- Autor: Cao, Chunjie
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 28.02.2022
- Genre: Krimi
Frontiers in Cyber Security
The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on: intelligent security; system security; network security; multimedia security; privacy, risk and trust; data and application security.
- Band: 1680
- Autor: Su, Chunhua
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 27.01.2023
- Genre: Krimi
Science of Cyber Security - SciSec 2022 Workshops
- Band: 1768
- Autor: Wang, Guojun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 15.02.2023
- Genre: Krimi
Ubiquitous Security
The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
- Band: 1804
- Autor: Prabhu, Srikanth
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.06.2023
- Genre: Krimi
Applications and Techniques in Information Security
The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
- Band: 2012
- Autor: Sun, Yuqing
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 04.01.2024
- Genre: Krimi
Computer Supported Cooperative Work and Social Computing
The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.
- Band: 2095
- Autor: You, Ilsun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 11.07.2024
- Genre: Krimi
Mobile Internet Security
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19–21, 2023.
The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
- Band: 2453
- Autor: Kanhere, Salil
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.04.2025
- Genre: Sonstiges
Distributed Ledger Technology
This book constitutes the refereed proceedings of the 8th International Symposium on Distributed Ledger Technology, SDLT 2024, held in Brisbane, QLD, Australia, during November 28–29, 2024.
The 8 full papers and 1 short paper included in this book were carefully reviewed and selected from 31 submissions. They deal with current systems and innovative solutions providing a robust scientific foundation for the advancement of Distributed Ledger Technology applications.
- Band: 14252
- Autor: Wang, Ding
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.10.2023
- Genre: Krimi
Information and Communications Security
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023.
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
- Band: 14402
- Autor: Kim, Howon
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 10.01.2024
- Genre: Krimi
Information Security Applications
The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
- Band: 14427
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14428
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis
- Band: 14429
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 24.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14562
- Autor: Seo, Hwajeong
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 07.03.2024
- Genre: Krimi
Information Security and Cryptology – ICISC 2023
The 31 full papers included in this book were carefully reviewed and selected from 78 submissions. They were organized in topical sections as follows:
Part I: Cryptanalysis and Quantum Cryptanalysis; Side Channel Attack; Signature Schemes.Part II: Cyber Security; Applied Cryptography; and Korean Post Quantum Cryptography.


















