Zahid Raza - Böcker
Visar alla böcker från författaren Zahid Raza. Handla med fri frakt och snabb leverans.
4 produkter
4 produkter
Del 863 - Lecture Notes in Networks and Systems
AISMA-2024: International Workshop on Advanced Information Security Management and Applications
Häftad, Engelska, 2024
2 508 kr
Skickas inom 10-15 vardagar
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
Del 1207 - Lecture Notes in Networks and Systems
AISMA-2023: International Workshop on Advanced Information Security Management and Applications
Häftad, Engelska, 2024
1 846 kr
Skickas inom 10-15 vardagar
This book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia.The book includes research on information security problems and solutions in the field of information security management, blockchain and cryptography, anomalies activity detection, authentication and key distribution, digital forensics. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: social activities quality, blockchain technology, anomaly detection in wireless sensor networks, DDoS attack detection, incident regulation and trust assessment.In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into some problems using blockchain technology in various applications. The book intends for readership specializing in the field of information security management and applications, information security methods and features.
Del 1456 - Lecture Notes in Networks and Systems
AISMA-2025: International Workshop on Advanced Information Security Management and Applications
Häftad, Engelska, 2025
1 846 kr
Skickas inom 10-15 vardagar
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications on May 11-15, 2025 in Stavropol, Russia, and online.This book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, this book gives insights into some problems in forecasting the development of information security events. This book intends for readership specializing in the field of information security management and applications, information security methods and features.
556 kr
Skickas inom 10-15 vardagar
The book, while introducing readers to the auction mechanism for resource provisioning in cloud computing, also endeavors to provide structured literature on the subject. Since various models have been proposed, it will help readers to formulate the cloud resource provisioning problem using the auction approach. The book also discusses challenges for resource provisioning in detail, helping to shape future research. The target audience for this book includes computer scientists, economists, industry professionals, research scholars, and postgraduate students. Computer science readers of this book will come to see that economics-based method are quite helpful in computer science, especially for resource provisioning. Readers with a cloud computing background will come to recognize the importance of dynamic pricing, the specific benefits of auctions, and how to formulate auctions for cloud computing. Lastly, readers from the economics community will come to understand their role in cloud computing, as well as where and how they can contribute.