Theories and Applications
Buch, Englisch, 315 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 711 g
ISBN: 978-3-030-66287-5
Verlag: Springer International Publishing
- cloud computing services;
- cyber security;
- data analytics; and,
- disruptive technologies like blockchain.
The book will be an excellent starting point for postgraduate students and researchers because each chapter is design to have future research directions.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Big Data
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Maschinelles Lernen
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
Weitere Infos & Material
Generative Adversarial Network for the Detection of Ransomware in Cyber Dynamics.- Deep Learning for Blockchain Technologies: A Survey and Research Directions.- Deep Recurrent Neural Network for the Enhancement of Resource Allocation in Edge Computing.- Recommender Systems in the Next Generation Cloud Architectures.- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms.- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms.- Resilient Edge Computing Devices Using Federated Learning Technique.- DeepFake: A Panacea for New Generation Simulated Videos.- Machine Learning-Based Malware Detection Systems in a Cyber-Physical Systems.- Support Vector Machine-Based Crypto-Locker Ransomware Attacks Detection with Grey-Wolf Optimization.- A Survey of Algorithms for Analysing Graph Data in the Cloud.- A Survey of Sequence Prediction Models to Predict Behaviour of Dynamic Systems.- Finding High Utility Patterns to Detect Network Attacks.- Authorship Attribution and User Profile Inference in Social Networks.- Deep Convolutional Neural Network for Data Analytics in the Cyber Dynamics.