Atjaunināt sīkdatņu piekrišanu

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 1520, 2022, Proceedings, Part III 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 734 pages, height x width: 235x155 mm, weight: 1139 g, 152 Illustrations, color; 105 Illustrations, black and white; XX, 734 p. 257 illus., 152 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1588
  • Izdošanas datums: 13-Jun-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031067630
  • ISBN-13: 9783031067631
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 118,31 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 139,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 734 pages, height x width: 235x155 mm, weight: 1139 g, 152 Illustrations, color; 105 Illustrations, black and white; XX, 734 p. 257 illus., 152 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1588
  • Izdošanas datums: 13-Jun-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031067630
  • ISBN-13: 9783031067631
Citas grāmatas par šo tēmu:
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows:

Part I: artificial intelligence;

Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics;

Part III: encryption and cybersecurity; information hiding; IoT security. 
Encryption and Cybersecurity.- Information Hiding.- IoT Security.