Narrow your search

Library

KU Leuven (21)

Odisee (21)

Thomas More Kempen (21)

Thomas More Mechelen (21)

VIVES (21)

UCLL (18)

AP (17)

KDG (17)

UGent (17)

ULiège (16)

More...

Resource type

book (45)

digital (17)


Language

English (56)


Year
From To Submit

2024 (1)

2023 (4)

2022 (5)

2021 (6)

2020 (9)

More...
Listing 1 - 10 of 56 << page
of 6
>>
Sort by

Book
Advanced computing and systems for security ; 8th Annual International Doctoral Symposium on Applied Computation and Security Systems Kolkata, India, April 9-10, 2021.
Author:
ISBN: 9811642877 9811642869 Year: 2022 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9-10, 2021. Organized by the Departments of Computer Science & Engineering and A.K. Choudhury School of Information Technology at the University of Calcutta, the symposiums international partners were Ca' Foscari University of Venice, Italy, and Bialystok University of Technology, Poland. The topics covered include biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks, and security systems, reflecting the various symposium sessions.


Book
Applied computing for software and smart systems : proceedings of ACSS 2022
Author:
ISBN: 9811967911 9811967903 Year: 2023 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book features a collection of high-quality research papers presented at the 9th International Symposium on Applied Computing for Software and Smart systems (ACSS 2022), to be held during September 09–10, 2022 in Kolkata, India. The book presents innovative works by undergraduate, graduate students and as well as PhD scholars. The emphasis of the workshop is on software and smart systems and research outcomes on other relevant areas pertaining to advancement of computing.


Book
Security in IoT : the changing perspective
Authors: ---
ISBN: 9780367711412 9780367711429 9781003149507 Year: 2022 Publisher: Boca Raton, Fla CRC Press, Taylor & Francis Group

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security in IoT : the changing perspective
Authors: ---
ISBN: 1003149502 1000531295 1000531260 1003149502 Year: 2022 Publisher: Boca Raton, Florida : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things. It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system.It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries. As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system;t he Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial toany readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.


Book
Computer Information Systems and Industrial Management : 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings
Authors: --- ---
ISBN: 3319591053 3319591045 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 16th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2017, held in Bialystok, Poland, in June 2017. The 60 regular papers presented together with 5 keynotes were carefully reviewed and Selected from 85 submissions. They are organized in the following topical sections: algorithms; biometrics and pattern recognition applications; data analysis and information retrieval; engineering of enterprise software products; industrial management and other applications; modelling and optimization; various aspects of computer security.


Book
Computer Information Systems and Industrial Management : 18th International Conference, CISIM 2019, Belgrade, Serbia, September 19–21, 2019, Proceedings
Authors: --- ---
ISBN: 3030289575 3030289567 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 18th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2019, held in Belgrade, Serbia, in September 2019. The 43 full papers presented together with 3 abstracts of keynotes were carefully reviewed and selected from 70 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; various aspects of computer security.

Keywords

Computer science. --- Artificial intelligence. --- Computer Communication Networks. --- Computer Applications. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Arithmetic and Logic Structures. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer networks --- Application software. --- Arithmetic and logic units, Computer. --- Computer communication systems. --- Arithmetic and logic units, Computer --- Computer arithmetic --- Electronic digital computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Circuits --- Distributed processing


Book
Applied Computation and Security Systems : Volume One
Authors: --- --- ---
ISBN: 9788132219859 8132219848 9788132219842 1322173974 8132219856 Year: 2015 Publisher: New Delhi : Springer India : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

Keywords

Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Computer architecture -- Congresses. --- Image processing -- Digital techniques -- Congresses. --- Pattern recognition systems -- Congresses. --- Wireless sensor networks -- Congresses. --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Electrical Engineering --- Applied Physics --- Computer networks --- Computers --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer security --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)


Book
Applied Computation and Security Systems : Volume Two
Authors: --- --- ---
ISBN: 9788132219880 8132219872 9788132219873 1322173982 8132219880 Year: 2015 Publisher: New Delhi : Springer India : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

Keywords

Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Artificial intelligence -- Congresses. --- Artificial intelligence -- Industrial applications -- Congresses. --- Soft computing -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Applied Physics --- Pattern recognition systems --- Image processing --- Wireless sensor networks --- Digital techniques --- WSNs (Sensor networks) --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer networks --- Low voltage systems --- Sensor networks --- Wireless communication systems --- Context-aware computing --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)


Book
Advanced Computing and Systems for Security : Volume 1
Authors: --- --- ---
ISBN: 8132226488 813222650X Year: 2016 Publisher: New Delhi : Springer India : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Computational intelligence. --- Computational Intelligence. --- Signal, Image and Speech Processing. --- Systems and Data Security. --- Data protection --- Security systems --- Hacking --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Information theory --- Modulation theory --- Oral communication --- Speech --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)

Listing 1 - 10 of 56 << page
of 6
>>
Sort by