Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI

Nonfiction, Computers, Advanced Computing, Artificial Intelligence, Information Technology, General Computing
Cover of the book Cloud Computing and Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030000219
Publisher: Springer International Publishing Publication: September 25, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030000219
Publisher: Springer International Publishing
Publication: September 25, 2018
Imprint: Springer
Language: English

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

More books from Springer International Publishing

Cover of the book Remediation Measures for Radioactively Contaminated Areas by
Cover of the book Bodies and Media by
Cover of the book Nonlinear Modeling of Solar Radiation and Wind Speed Time Series by
Cover of the book Model-Based Processing for Underwater Acoustic Arrays by
Cover of the book Extremism, Radicalization and Security by
Cover of the book A History of Health & Fitness: Implications for Policy Today by
Cover of the book Making Better Decisions Using Systems Thinking by
Cover of the book It From Bit or Bit From It? by
Cover of the book Cellular and Molecular Toxicology of Nanoparticles by
Cover of the book Safe and Sustainable Use of Arsenic-Contaminated Aquifers in the Gangetic Plain by
Cover of the book Qualitative Methodologies in Organization Studies by
Cover of the book Molecular Genetics of Endometrial Carcinoma by
Cover of the book Multiple Criteria Decision Aid by
Cover of the book Device-Free Object Tracking Using Passive Tags by
Cover of the book Geoinformatics for Intelligent Transportation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy