000 | 04177nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-031-64650-8 | ||
003 | DE-He213 | ||
005 | 20250516160103.0 | ||
007 | cr nn 008mamaa | ||
008 | 240713s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031646508 _9978-3-031-64650-8 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aIntelligent Systems Design and Applications _h[electronic resource] : _bInformation and Network Security, Volume 3 / _cedited by Ajith Abraham, Sabri Pllana, Thomas Hanne, Patrick Siarry. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXVII, 479 p. 155 illus., 124 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v1048 |
|
505 | 0 | _aMisdirection attack in wireless sensor network using threshold method -- Blockchain for data traceability in the agricultural sector -- Detection of fake URLs using deep LSTM architecture over Social Media -- Leveraging Blockchain for Secure Water Meter Reading -- A Hybrid Differential-Evolution-based approach to the sensor network localisation problem -- A Review on Physical Abuse Detection Techniques using Video Surveillance Systems -- Detection of Suspicious Activities at Hypervisor in Cloud Computing A Brief Study -- A Simple Genetic Algorithm for the Maximum Min Sum Dispersion Problem Max MinSum DP and New Node Similarity based Variants -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and its Legal and Ethical Implications -- A methodology to evaluate the security of block ciphers against neurocryptanalytic attacks. | |
520 | _aThis book highlights recent research on intelligent systems and nature-inspired computing. It presents 50 selected papers focused on Information and Network Security from the 23rd International Conference on Intelligent Systems Design and Applications (ISDA 2023), which was held in 5 different cities namely Olten, Switzerland; Porto, Portugal; Kaunas, Lithuania; Greater Noida, India; Kochi, India, and in online mode. The ISDA is a premier conference in the field of artificial intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. ISDA 2023 had contributions by authors from 64 countries. This book offers a valuable reference guide for all network and security specialists, scientists, academicians, researchers, students, and practitioners in the field of artificial intelligence and information/network security. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aArtificial Intelligence. |
700 | 1 |
_aAbraham, Ajith. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPllana, Sabri. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHanne, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSiarry, Patrick. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031646492 |
776 | 0 | 8 |
_iPrinted edition: _z9783031646515 |
830 | 0 |
_aLecture Notes in Networks and Systems, _x2367-3389 ; _v1048 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-64650-8 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c275661 _d275660 |