熱門搜尋
【我要重新搜尋】
您輸入的關鍵字: Al-Sakib
搜尋結果共 50 筆, 頁數 1 / 1
呈現:
This book introduces some fundamentals of information and communication technology (ICT) and other c... more
This book, divided into three parts, describes the detailed concepts of Digital Communication, Secur... more
Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security... more
This book constitutes the refereed proceedings of the Second EAI International Conference on Smart G... more
Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future A... more
Think about someone taking control of your car while you’re driving. Or, someone hacking into a dron... more
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues sur... more
Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converg... more
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human... more
Advances such as cloud computing and streaming multimedia are steadily increasing the demand on netw... more
As software and computer hardware grows in complexity, networks have grown to match. The increasing ... more
The benefits of distributed computing are evidenced by the increased functionality, retrieval capabi... more
Rapid advancements in mobile computing and communication technology and recent technological progres... more
Part I: State-of-the-art.- Online Fake News Detection Using Machine Learning Techniques: A Systemati... more
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and appl... more
Medical IoTHireche Rachida, Houssem Mansouri, Al-Sakib Khan Pathan Chapter 05A Comprehensive Study on Cybersecurity challenges...... more
This book constitutes the refereed post-conference proceedings of the 16th International Conference ... more
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explore... more
Having been catapulted into public discourse in the last few years, this book serves as an in-depth ... more
This book presents practical demonstrations of numerically calculating or obtaining Fourier Transfor... more
Large data sets arriving at every increasing speeds require a new set of efficient data analysis tec... more
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some exa... more
A guide to the current technologies related to the delivery process for both live and on-demand serv... more
Cryptography, the science of encoding and decoding information, allows people to do online banking, ... more
Simulation is a widely used mechanism for validating the theoretical models of networking and commun... more
Able to propagate quickly and change their payload with each infection, polymorphic worms have been ... more
This book addresses the key security challenges in the big data centric computing and network system... more