دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) سری: Advances in Intelligent Systems and Computing 580 ISBN (شابک) : 9783319670706, 9783319670713 ناشر: Edizioni della Normale سال نشر: 2018 تعداد صفحات: 534 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 42 مگابایت
کلمات کلیدی مربوط به کتاب کنفرانس بین المللی برنامه ها و تکنیک ها در امنیت سایبری و هوشمند سازی: برنامه ها و تکنیک ها در امنیت سایبری و اطلاعاتی: هوش محاسباتی
در صورت تبدیل فایل کتاب International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کنفرانس بین المللی برنامه ها و تکنیک ها در امنیت سایبری و هوشمند سازی: برنامه ها و تکنیک ها در امنیت سایبری و اطلاعاتی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب نتایج کنفرانس بینالمللی کاربردها و تکنیکها در امنیت و اطلاعات سایبری در سال 2017 را ارائه میکند که بر تمام جنبههای تکنیکها و کاربردها در امنیت سایبری و الکترونیک و تحقیقات اطلاعاتی تمرکز داشت. این کنفرانس یک انجمن برای ارائه و بحث درباره ایدههای نوآورانه، یافتههای تحقیقاتی پیشرفته، و تکنیکها، روشها و کاربردهای جدید در همه جنبههای امنیت و اطلاعات سایبری و الکترونیکی فراهم میکند.
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.
Front Matter ....Pages i-xv
The Fast Lane Detection of Road Using RANSAC Algorithm (Huan Du, Zheng Xu, Yong Ding)....Pages 1-7
Face Detection and Description Based on Video Structural Description Technologies (Zhiguo Yan, Huan Du, Zheng Xu)....Pages 8-12
Cloud Based Image Retrieval Scheme Using Feature Vector (Pan Gao, Jun Ye)....Pages 13-16
Research on Security Outsourcing Privacy in Cloud Environments (Zhuoyan Wang)....Pages 17-20
MapReduce-Based Approach to Find Accompany Vehicle in Traffic Data (Yuliang Zhao, Peng Wang, Wei Wang, Lingling Hu, Xu Xu)....Pages 21-27
Research on the Architecture of Road Traffic Accident Analysis Platform Based on Big Data (Lingling Hu, Yuliang Zhao)....Pages 28-34
Operating the Public Information Platform for Logistics with Internet Thinking (Changfan Xiao, Qili Xiao, Jiqiu Li)....Pages 35-41
Deep Neural Network with Limited Numerical Precision (YuXin Cai, Chen Liang, ZhiWei Tang, Huosheng Li, Siliang Gong)....Pages 42-50
Optimization Technology of CNN Based on DSP (YuXin Cai, Chen Liang, ZhiWei Tang, Huosheng Li)....Pages 51-59
Fuzzy Keyword Search Based on Comparable Encryption (Jun Ye, Zheng Xu, Yong Ding)....Pages 60-66
Risk Evaluation of Financial Websites Based on Structure Mining (Huakang Li, Yuhao Dai, Xu Jin, Guozi Sun, Tao Li, Zheng Xu)....Pages 67-72
Word Vector Computation Based on Implicit Expression (Xinzhi Wang, Hui Zhang)....Pages 73-79
Security Homomorphic Encryption Scheme Over the MSB in Cloud (Hanbin Zhang)....Pages 80-89
Research on Performance Optimization of Several Frequently-Used Genetic Algorithm Selection Operators (Qili Xiao, Jiqiu Li, Changfan Xiao)....Pages 90-97
A Novel Representation of Academic Field Knowledge (Jie Yu, Chao Tao, Lingyu Xu, Fangfang Liu)....Pages 98-107
Textual Keyword Optimization Using Priori Knowledge (Li Li, Xiao Wei, Zheng Xu)....Pages 108-115
A Speed Estimation Method of Vehicles Based on Road Monitoring Video-Images (Duan Huixian, Wang Jun, Song Lei, Zhao Yixin, Na Liu)....Pages 116-121
Document Security Identification Based on Multi-classifier (Kaiwen Gu, Huakang Li, Guozi Sun)....Pages 122-127
Collaborative Filtering-Based Matching and Recommendation of Suppliers in Prefabricated Component Supply Chain (Juan Du, Hengqing Jing)....Pages 128-139
A Robust Facial Descriptor for Face Recognition (Na Liu, Huixian Duan, Lei Song, Zhiguo Yan)....Pages 140-145
Multiple-Step Model Training for Face Recognition (Dianbo Li, Xiaoteng Zhang, Lei Song, Yixin Zhao)....Pages 146-153
Public Security Big Data Processing Support Technology (Yaqin Zhou)....Pages 154-160
A Survey on Risks of Big Data Privacy (Kui Wang)....Pages 161-167
A Vehicle Model Data Classification Algorithm Based on Hierarchy Clustering (Yixin Zhao, Jie Shao, Dianbo Li, Lin Mei)....Pages 168-176
Research on Collaborative Innovation Between Smart Companies Based on the Industry 4.0 Standard (Yuman Lu, Aimin Yang, Yue Guo)....Pages 177-184
The Development Trend Prediction of the Internet of Things Industry in China (Li Hao Yan)....Pages 185-193
Publicly Verifiable Secret Sharing Scheme in Hierarchical Settings Using CLSC over IBC (Pinaki Sarkar, Sukumar Nandi, Morshed Uddin Chowdhury)....Pages 194-205
A New Multidimensional and Fault-Tolerable Data Aggregation Scheme for Privacy-Preserving Smart Grid Communications (Bofeng Pan, Peng Zeng, Kim-Kwang Raymond Choo)....Pages 206-219
Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients (Junaid Chaudhry, Samaneh Farmand, Syed M. S. Islam, Md. Rafiqul Islam, Peter Hannay, Craig Valli)....Pages 220-237
A Novel Swarm Intelligence Based Sequence Generator (Khandakar Rabbi, Quazi Mamun, Md. Rafiqul Islam)....Pages 238-246
A Novel Swarm Intelligence Based Strategy to Generate Optimum Test Data in T-Way Testing (Khandakar Rabbi, Quazi Mamun, Md. Rafiqul Islam)....Pages 247-255
Alignment-Free Fingerprint Template Protection Technique Based on Minutiae Neighbourhood Information (Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury)....Pages 256-265
Malware Analysis and Detection Using Data Mining and Machine Learning Classification (Mozammel Chowdhury, Azizur Rahman, Rafiqul Islam)....Pages 266-274
Abnormal Event Detection Based on in Vehicle Monitoring System (Lei Song, Jie Dai, Huixian Duan, Zheyuan Liu, Na Liu)....Pages 275-280
A Novel Algorithm to Protect Code Injection Attacks (Hussein Alnabulsi, Rafiqul Islam, Qazi Mamun)....Pages 281-292
Attacking Crypto-1 Cipher Based on Parallel Computing Using GPU (Weikai Gu, Yingzhen Huang, Rongxin Qian, Zheyuan Liu, Rongjie Gu)....Pages 293-303
A Conceptual Framework of Personally Controlled Electronic Health Record (PCEHR) System to Enhance Security and Privacy (Quazi Mamun)....Pages 304-314
Frequency Switch, Secret Sharing and Recursive Use of Hash Functions Secure (Low Cost) Ad Hoc Networks (Pinaki Sarkar, Morshed Uddin Chowdhury, Jemal Abawajy)....Pages 315-328
An Enhanced Anonymous Identification Scheme for Smart Grids (Shanshan Ge, Peng Zeng, Kim-Kwang Raymond Choo)....Pages 329-337
Shellshock Vulnerability Exploitation and Mitigation: A Demonstration (Rushank Shetty, Kim-Kwang Raymond Choo, Robert Kaufman)....Pages 338-350
Research on Web Table Positioning Technology Based on Table Structure and Heuristic Rules (Tao Liao, Tianqi Liu, Shunxiang Zhang, Zongtian Liu)....Pages 351-360
Research on Data Security of Public Security Big Data Platform (Zhining Fan)....Pages 361-369
Deployment and Management of Tenant Network in Cloud Computing Platform of Openstack (Liangbin Zhang, Yuanming Wang, Ran Jin, Shaozhong Zhang, Kun Gao)....Pages 370-379
The Extraction Method for Best Match of Food Nutrition (Guangli Zhu, Hanran Liu, Shunxiang Zhang)....Pages 380-387
Extraction Method of Micro-Blog New Login Word Based on Improved Position-Word Probability (Hongze Zhu, Shunxiang Zhang)....Pages 388-393
Building the Knowledge Flow of Micro-Blog Topic (Xiaolu Deng, Shunxiang Zhang, Hongze Zhu)....Pages 394-400
A Parallel Algorithm of Mining Frequent Pattern on Uncertain Data Streams (Yanfen Chang)....Pages 401-408
Research on Rolling Planning of Distribution Network Based on Big Data Analysis (Yanke Ci, Yun Meng, Min Dong)....Pages 409-417
Effect Analysis and Strategy Optimization of Endurance Training for Female College Students Based on EEG Analysis (Li Han)....Pages 418-425
Clustering XML Documents Using Frequent Edge-Sets (Zhiyuan Jin, Le Wang, Yanfen Chang)....Pages 426-433
Analytical Application of Hadoop-Based Collaborative Filtering Recommended Algorithm in Tea Sales System (Li Li)....Pages 434-441
Semi-supervised Sparsity Preserving Projection for Face Recognition (Le Wang, Huibing Wang, Zhiyuan Jin, Shui Wang)....Pages 442-449
Animated Analysis of Comovement of Forex Pairs (Shui Wang, Le Wang, Weipeng Zhang)....Pages 450-457
The Study of WSN Node Localization Method Based on Back Propagation Neural Network (Chunliang Zhou, Le Wang, Lu Zhengqiu)....Pages 458-466
Research on the Application of Big Data in China’s Commodity Exchange Market (Huasheng Zou, Zhiyuan Jin)....Pages 467-474
Research and Implementation of Multi-objects Centroid Localization System Based on FPGA&DSP (Guangyu Zhou, Ping Cheng)....Pages 475-482
Smart City Security Based on the Biological Self-defense Mechanism (Leina Zheng, Tiejun Pan, Souzhen Zeng, Ming Guo)....Pages 483-492
Induced Generalized Intuitionistic Fuzzy Aggregation Distance Operators and Their Application to Decision Making (Tiejun Pan, Leina Zheng, Souzhen Zeng, Ming Guo)....Pages 493-500
New 2-Tuple Linguistic Aggregation Distance Operator and Its Application to Information Systems Security Assessment (Shouzhen Zeng, Tiejun Pan, Jianxin Bi, Chonghui Zhang, Fengyu Bao)....Pages 501-508
Research and Analysis on the Search Algorithm Based on Artificial Intelligence About Chess Game (Chunfang Huang)....Pages 509-517
Back Matter ....Pages 519-520