4 results
Search Results
2. Cyber Security
- Author
-
Lu, Wei, Wen, Qiaoyan, Zhang, Yuqing, Lang, Bo, Wen, Weiping, Yan, Hanbing, Li, Chao, Ding, Li, Li, Ruiguang, and Zhou, Yu
- Subjects
Systems and Data Security ,Computer Communication Networks ,Information Systems Applications (incl. Internet) ,Computer System Implementation ,Cryptology ,Mobile and Network Security ,Data and Information Security ,Computer and Information Systems Applications ,communication channels (information theory) ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data security ,databases ,network protocols ,network security ,sensors ,signal processing ,telecommunication networks ,telecommunication systems ,telecommunication traffic ,wireless telecommunication systems ,Network hardware ,Information retrieval ,Internet searching ,Systems analysis & design ,Coding theory & cryptology ,Data encryption ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security - Abstract
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
- Published
- 2020
- Full Text
- View/download PDF
3. The Impact of Digital Technologies on Public Health in Developed and Developing Countries
- Author
-
Jmaiel, Mohamed, Mokhtari, Mounir, Abdulrazak, Bessam, Aloulou, Hamdi, and Kallel, Slim
- Subjects
Computer Communication Networks ,Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Special Purpose and Application-Based Systems ,Computer System Implementation ,User Interfaces and Human Computer Interaction ,Computer and Information Systems Applications ,open access ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,Internet of Things ,IoT ,machine learning ,network protocols ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems ,Network hardware ,Artificial intelligence ,Information retrieval ,Internet searching ,Expert systems / knowledge-based systems ,Systems analysis & design ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
4. Graph Structures for Knowledge Representation and Reasoning
- Author
-
Cochez, Michael, Croitoru, Madalina, Marquis, Pierre, and Rudolph, Sebastian
- Subjects
Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Computer Communication Networks ,Mathematical Logic and Formal Languages ,Computer and Information Systems Applications ,Formal Languages and Automata Theory ,open access ,concept lattices ,data mining ,databases ,fca ,formal concept analysis ,formal languages ,formal logic ,information analysis ,information systems ,knowledge-based system ,model-based reasoning ,network protocols ,ontologies ,Information retrieval ,Internet searching ,Network hardware ,Mathematical theory of computation ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science - Abstract
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were reviewed and selected from 9 submissions. The contributions address various issues for knowledge representation and reasoning and the common graph-theoretic background, which allows to bridge the gap between the different communities.
- Published
- 2021
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.