Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Mobile agents (Computer software) --- Sensor networks. --- Computer science. --- Mathematical logic. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Mathematical Logic and Formal Languages. --- Mobile Computing. --- Networks, Sensor --- Detectors --- Context-aware computing --- Multisensor data fusion --- Agents, Mobile (Computer software) --- Mobile Internet agents (Computer software) --- Intelligent agents (Computer software) --- Mobile computing. --- Electronic data processing --- Portable computers --- Informatics --- Science --- Application software. --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
Mathematical logic --- Computer science --- Information systems --- Computer. Automation --- GSM (global system for mobile communications) --- mobiele netwerken --- computers --- informatiesystemen --- wiskunde --- logica --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains. .
Data protection. --- Computer engineering. --- Computer networks. --- Data and Information Security. --- Computer Engineering and Networks. --- Computer Communication Networks. --- Computer security --- Computers --- Access control
Choose an application
Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbeveiliging --- computernetwerken
Listing 1 - 4 of 4 |
Sort by
|