Theories and Applications
Buch, Englisch, 315 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 493 g
ISBN: 978-3-030-66290-5
Verlag: Springer International Publishing
- cloud computing services;
- cyber security;
- data analytics; and,
- disruptive technologies like blockchain.
The book will be an excellent starting point for postgraduate students and researchers because each chapter is design to have future research directions.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Maschinelles Lernen
- Technische Wissenschaften Energietechnik | Elektrotechnik Elektrotechnik
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Ambient Intelligence, RFID, Internet der Dinge
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Big Data
Weitere Infos & Material
Generative Adversarial Network for the Detection of Ransomware in Cyber Dynamics.- Deep Learning for Blockchain Technologies: A Survey and Research Directions.- Deep Recurrent Neural Network for the Enhancement of Resource Allocation in Edge Computing.- Recommender Systems in the Next Generation Cloud Architectures.- Collusion Detection in the Internet of Vehicles Environment via Machine Learning Algorithms.- Mobile Cloud Computing Security Strategies Using Machine Learning Algorithms.- Resilient Edge Computing Devices Using Federated Learning Technique.- DeepFake: A Panacea for New Generation Simulated Videos.- Machine Learning-Based Malware Detection Systems in a Cyber-Physical Systems.- Support Vector Machine-Based Crypto-Locker Ransomware Attacks Detection with Grey-Wolf Optimization.- A Survey of Algorithms for Analysing Graph Data in the Cloud.- A Survey of Sequence Prediction Models to Predict Behaviour of Dynamic Systems.- Finding High Utility Patterns to Detect Network Attacks.- Authorship Attribution and User Profile Inference in Social Networks.- Deep Convolutional Neural Network for Data Analytics in the Cyber Dynamics.