Atjaunināt sīkdatņu piekrišanu

Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 710, 2021, Revised Selected Papers 1st ed. 2022 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 416 pages, height x width: 235x155 mm, weight: 658 g, 86 Illustrations, color; 35 Illustrations, black and white; XIII, 416 p. 121 illus., 86 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13291
  • Izdošanas datums: 16-Jun-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031081463
  • ISBN-13: 9783031081460
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 55,83 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 65,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 416 pages, height x width: 235x155 mm, weight: 658 g, 86 Illustrations, color; 35 Illustrations, black and white; XIII, 416 p. 121 illus., 86 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13291
  • Izdošanas datums: 16-Jun-2022
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031081463
  • ISBN-13: 9783031081460
Citas grāmatas par šo tēmu:
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.





The 18 full papers and 9 short paper presented in this book were carefully reviewed and selected from 62 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design.





Chapters A Quantile-based Watermarking Approach for Distortion Minimization, Choosing Wordlists for Password Guessing: An Adaptive Multi-Armed Bandit Approach and A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.