1
Advancements in Smart Computing and Information Security [E-Book] : Second International Conference, ASCIS 2023, Rajkot, India, December 7-9, 2023, Revised Selected Papers, Part I /
Table of Contents: ...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...

Full text 
2
Advancements in Smart Computing and Information Security [E-Book] : Second International Conference, ASCIS 2023, Rajkot, India, December 7-9, 2023, Revised Selected Papers, Part II /
Table of Contents: ...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...

Full text 
3
Advancements in Smart Computing and Information Security [E-Book] : Second International Conference, ASCIS 2023, Rajkot, India, December 7-9, 2023, Revised Selected Papers, Part III /
Table of Contents: ...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...

Full text 
4
Advancements in Smart Computing and Information Security [E-Book] : Second International Conference, ASCIS 2023, Rajkot, India, December 7-9, 2023, Revised Selected Papers, Part IV /
Table of Contents: ...Artificial Intelligence -- Machine Learning -- Deep Learning -- Neural Networks -- Image Processing -- Smart Computing -- Cloud Computing Security -- IoT -- Blockchain -- Cyber Security -- Systems Security -- Cryptography -- Encryption -- Attacks...

Full text 
5
Applied Intelligence and Informatics [E-Book] : Third International Conference, AII 2023, Dubai, United Arab Emirates, October 29-31, 2023, Revised Selected Papers /
Table of Contents: ... with Random Forest-Based Anomaly Detection. -- A Survey of Challenges Associated with Cloud Computing Security....

Full text 
6
Multi-disciplinary Trends in Artificial Intelligence [E-Book] : 16th International Conference, MIWAI 2023, Hyderabad, India, July 21-22, 2023, Proceedings /
Table of Contents: ... applications -- Low Light image Illumination Adjustment using Fusion of MIRNet and Deep Illumination Curves -- A HYBRID INTELLIGENT CRYPTOGRAPHY ALGORITHM FOR DISTRIBUTED BIG DATA STORAGE IN CLOUD COMPUTING SECURITY -- An Ensemble Technique to Detect Stress...

Full text 
7
Computational Intelligence [E-Book] : Select Proceedings of InCITe 2022 /
8
Proceedings of World Conference on Artificial Intelligence: Advances and Applications [E-Book] : WCAIAA 2023 /
Table of Contents: ... consumption forecasting -- Chaotic Quasi-Oppositional Chemical Reaction Optimization for Optimal Tuning of Single Input Power System Stabilizer -- Network Intrusion Detection System for Cloud Computing security usingDeep Neural Network framework -- Detection...

Full text 
9
Decision Intelligence [E-Book] : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 1 /
10
Decision Intelligence Solutions [E-Book] : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 2 /
11
Netzwerke mit Windows 11 : für Zuhause und Selbstständige /
Book
12
Information and Knowledge in Internet of Things [E-Book] /
Table of Contents: ... Intelligence -- Pervasive Environments -- Pervasive Information Systems Applied to Social Solutions -- Pervasive Systems Based on Cloud Computing -- Security in Information Systems -- Security, Trust, and Privacy Issues in IoT -- Smart Home IoT -- Smart Destinations...

Full text 
13
Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics : Theories and Applications [E-Book] /
Table of Contents: ... -- Recommender Systems in the Next Generation Cloud Architectures -- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms -- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms -- Resilient Edge Computing...

Full text 
14
Nanoelectronics, Circuits and Communication Systems [E-Book] : Proceeding of NCCS 2019 /
Table of Contents: ...Active Security by Implementing Intrusion Detection and Facial Recognition -- Image Processing Using Median Filtering for Identification of Leaf Disease -- Cloud Computing: Security Issues and Challenges -- Application of Knowledge and Data Mining...

Full text 
15
Developments in Information & Knowledge Management for Business Applications [E-Book] : Volume 2 /
Table of Contents: ...: Critical Differences in Theory, Implementation, and Applicability of Two Growing Cloud Services -- Management and Measuring Customer Loyalty in Digital Marketplace - Analysis of KPIs and Influence Factors in CLTV -- Cost-effective solutions in Cloud Computing...

Full text 
16
Transforming Cybersecurity Solutions using Blockchain [E-Book] /
Table of Contents: ...1. Introduction to Blockchain Technology -- 2. Cloud Computing Security using Blockchain Technology -- 3. An Introduction to Blockchain Technology and their Applications in the Actuality with a View of its Security Aspects -- 4. Blockchain based Cyber...

Full text 
17
Soft Computing Applications [E-Book] : Proceedings of the 8th International Workshop Soft Computing Applications (SOFA 2018), Vol. I /
18
Soft Computing Applications [E-Book] : Proceedings of the 8th International Workshop Soft Computing Applications (SOFA 2018), Vol. II /
19
Security designs for the cloud, IoT, and social networking [E-Book] /
Subject (ZB): ...Cloud computing -- Security measures....

Full text 
20
Implementing AWS : design , build, and manage your infrastructure : leverage AWS features to build highly secure, fault-tolerant and scalable cloud environments [E-Book] /