1
Smart Trends in Computing and Communications [E-Book] : Proceedings of SmartCom 2022 /
Table of Contents: ...Chapter 1. Implementation of Tweet Stream Summarization for Malicious Tweet Detection -- Chapter 2. Comparative Analysis of A Secure Authentication Protocol For 5g Enabled IoT Network Using Public and Shared Secret Key -- Chapter 3. DDOS Botnet Attack...

Full text 
2
Secure Automatic Dependent Surveillance-Broadcast Systems [E-Book] /
Table of Contents: ...Introduction -- An Overview of ADS-B -- Basic Techniques for Securing ADS-B Systems -- Enabling Confidentiality for ADS-B Broadcast Messages -- Efficient ADS-B Broadcast -- Authentication with Batch Verification -- Efficient ADS-B Broadcast...

Full text 
3
Advances in Swarm Intelligence [E-Book] : 14th International Conference, ICSI 2023, Shenzhen, China, July 14-18, 2023, Proceedings, Part I /
Table of Contents: ...Swarm Robotics and UAV A Blockchain-Based Service-Oriented Framework to Enable Cooperation of Swarm Robots -- Collective Behavior for Swarm Robots with Distributed Learning -- Exploration of Underwater Environments with a Swarm of Heterogeneous Surface...

Full text 
4
Advances in Swarm Intelligence [E-Book] : 14th International Conference, ICSI 2023, Shenzhen, China, July 14-18, 2023, Proceedings, Part II /
Table of Contents: ...Swarm Robotics and UAV A Blockchain-Based Service-Oriented Framework to Enable Cooperation of Swarm Robots -- Collective Behavior for Swarm Robots with Distributed Learning -- Exploration of Underwater Environments with a Swarm of Heterogeneous Surface...

Full text 
5
4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing [E-Book] : BDCC 2021 /
Table of Contents: ... Voting System -- Chapter 10. AI-Enabled Pregnancy Risk Monitoring and Prediction: A Review -- Chapter 11. Finger Knuckle Print Recognition using Complex Conjugate Feature Vector -- Part IV. Bigdata and Technology -- Chapter 12. What Your Tweets Say about You...

Full text 
6
Broadband Communications, Computing, and Control for Ubiquitous Intelligence [E-Book] /
Cai, Lin
2022
Table of Contents: ...Introduction -- Advanced communication systems -- Network architecture and protocol design -- Cloud and edge computing -- Machine learning and AI -- Coordinated control and digital twins -- Security and privacy -- Conclusion....

Full text 
7
Enabling 6G Mobile Networks [E-Book] /
Subject (ZB): ...Computational intelligence....

Full text 
8
Proceedings of the 12th International Conference on Computer Engineering and Networks [E-Book] /