000 04142nam a22005895i 4500
001 978-981-33-6385-4
003 DE-He213
005 20240423130132.0
007 cr nn 008mamaa
008 210402s2021 si | s |||| 0|eng d
020 _a9789813363854
_9978-981-33-6385-4
024 7 _a10.1007/978-981-33-6385-4
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aInformation Science and Applications
_h[electronic resource] :
_bProceedings of ICISA 2020 /
_cedited by Hyuncheol Kim, Kuinam J. Kim, Suhyun Park.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXIV, 398 p. 133 illus., 103 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v739
505 0 _aExperience and prospects of tele-health technologies -- Exploring the Effects of Network Topology Layers on Quality of Service Mechanisms in the Context of Software-Defined Networking -- Image Background Subtraction and Partial Stylization based on Style Representation of Convolutional Neural Networks -- Multi-source log clustering in distributed systems -- A Study on Classification and Integration of Research on both AI and Security in the IoT Era -- Safe Internet: An Edutainment Tool for Teenagers -- Predictive Analytics Service for Security of Blockchain and Peer-to-Peer Payment Solutions -- Deterring SLCAs by Establishment of ACSC based on IPP YoungYungShin 9.30 -- Research on life cycle model of data for handling Big Data-based security incident -- Feature Selection Based on a Shallow Convolutional Neural Network and Saliency Maps on Metagenomic Data.
520 _aThis book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.
650 0 _aApplication software.
650 0 _aTelecommunication.
650 0 _aData protection.
650 0 _aComputational intelligence.
650 1 4 _aComputer and Information Systems Applications.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aData and Information Security.
650 2 4 _aComputational Intelligence.
700 1 _aKim, Hyuncheol.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKim, Kuinam J.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPark, Suhyun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813363847
776 0 8 _iPrinted edition:
_z9789813363861
776 0 8 _iPrinted edition:
_z9789813363878
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v739
856 4 0 _uhttps://doi.org/10.1007/978-981-33-6385-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185428
_d185428