Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018) (Advances in Intelligent Systems and Computing)

個数:
電子版価格
¥26,639
  • 電子版あり

Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018) (Advances in Intelligent Systems and Computing)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 394 p.
  • 商品コード 9783030170646

Full Description

This book highlights recent research on Soft Computing, Pattern Recognition, Information Assurance and Security. It presents 38 selected papers from the 10th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018) and the 14th International Conference on Information Assurance and Security (IAS 2018) held at Instituto Superior de Engenharia do Porto (ISEP), Portugal during December 13-15, 2018. SoCPaR - IAS 2018 is a premier conference and brings together researchers, engineers and practitioners whose work involves soft computing and information assurance and their applications in industry and the real world. Including contributions by authors from over 25 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

 

Contents

An Efficient and Secure Forward Error Correcting Scheme for DNA Data Storage.- A Blockchain-based Scheme for Access Control in e-Health Scenarios.- Blockchain-based PKI for Crowdsourced IoT Sensor Information.- The Design of a Cloud Forensics Middleware System Base on Memory Analysis.- Privacy Enhancement of Telecom Processes Interacting with Charging Data Records.- Warning of Affected Users About an Identity Leak.- Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices.- A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment.- A survey of blockchain frameworks and applications.- Filtering Email Addresses, Credit Card Numbers and searching for Bitcoin Artifacts with the Autopsy Digital Forensics Software.- A survey on the use of data points in IDS research.- Cybersecurity and digital forensics - course development in a higher education institution.- Model Driven Architectural Design of Information Security System.- An Automated System for Criminal Police Reports Analysis.- Detecting Internet-Scale Traffic Redirection Attacks using Latent Class Models.- Passive Video Forgery Detection Considering Spatio-Temporal Consistency.

最近チェックした商品