Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts
Electronic data processing departments --- Electronic data processing --- Internet --- Networking --- Security measures. --- Distributed processing. --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer department security measures --- Data protection
Choose an application
Choose an application
Choose an application
This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
Choose an application
This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
Choose an application
Computer networks --- Computer security. --- Computational intelligence. --- Security measures. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Protection --- Security measures
Choose an application
Choose an application
An Empirical Study on the Evolutionary Mechanism of Tourism Enterprises in Computer System Data Analysis.- A Preliminary Study of the Modeling and Simulation Technology of New Artificial Intelligence System in the Era of Big Data.- Computer Distributed Mirror Storage Algorithm for Desktop Virtualization.- Construction of Financial Investment Risk Measurement Model Based on Big Data.- Research on Straw Weaving Modeling System Based on Machine Learning Algorithm.- 5G New Radio Waveform with Time-Frequency Optimized Multiwavelet Packet.- Application of AR Technology in the Design of Cultural Communication Platform System.- Application Research on Facial Makeup Modeling Activation of Classical Opera Based on AR Virtual Information Technology.- An Evaluation Method of Light Strip Center Detection Algorithm Based on Line Structured Light Vision.- Design and Application Analysis of Network Command System for Power Grid Dispatching Operation.- Research and Implementation of Application Scenarios for Dispatching Voice Interaction Based on Artificial Intelligence.- Intelligent Accounting System Structure and Intelligent Accounting Algorithm Based on Computer Vision.- A Research on the Intelligent Recognition of Athletes' Wrong Actions Based on Visual Data Technology.- Virtual Reality Video CU Partition Fast System Based on Dynamic Selection Algorithm.- Risk Analysis Model of Financial Management Products Based on Clustering Algorithm.- Weak and Small Face Target Recognition based on MTCNN Network in Dynamic Platform.
Choose an application
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Choose an application
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Listing 1 - 10 of 10 |
Sort by
|