Search Results
-
Advances in Web-Based Learning – ICWL 2021: 20th International Conference, ICWL 2021, Macau, China, November 13–14, 2021, Proceedings (Lecture Notes in Computer Science #13103)
by Wanlei Zhou • Yi MuThis book constitutes the proceedings of the 20th International Conference on Advances in Web-Based Learning, ICWL 2021, which was held in Macau, China, in November 2021. The papers included in this volume deal with multiple topics, from algorithms to systems and applications and are organized in 3 ... More
Language: ENGCopyright: 2021 -
Differential Privacy and Applications
This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement d... More
Language: ENGCopyright: 2017 -
Location Privacy in Mobile Applications (SpringerBriefs on Cyber Security Systems and Networks)
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection... More
Language: ENGCopyright: 2018 -
Delay Tolerant Networks
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical ap... More
Language: ENGCopyright: 2015 -
Malicious Attack Propagation and Source Identification (Advances in Information Security #73)
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi... More
Language: ENGCopyright: 2019 -
Adversarial Deep Learning in Cybersecurity: Attack Taxonomies, Defence Mechanisms, and Learning Theories
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the lat... More
Language: ENGCopyright: 2023 -
Cruise Ship Tourism
by Jo-Anne Lester • Ross Dowling • James Henry • Abel Alonso • Michael Lück • Lori Pennington-Gray • Alexis Papathanassis • Clare Weeden • Hannah Wood • Professor Noel Scott • Sandra Wilson • Joseph M Cheer • Sheree-Ann Adams • Professor Michael Clancy • Professor Ross A Klein • William Terry • Professor Xavier Font • Mireia Guix Navarrete • Maria Jesús Bonilla • Jill Poulston • Michael P. Vogel • Adam Weaver • Philip Gibson • Maree Thyne • Júlio Mendes • Manuela Guerreiro • Bingjie Liu • Peter Tarlow • Arja Lemmetyinen • Gabriella Polizzi • Antonino Mario Oliveri • Professor James Petrick • Suiwen Zou • Kam Hung • Claire Lambert • Nigel Jarvis • Ioannis Pantelidis • Nevil Alexander • Eloise Botelho • Carla Fraga • Rodrigo Vilani • Michael Shone • Jude Wilson • David G Simmons • Emma J Stewart • Gaetano Sabato • C Michael Hall • Claire Ellis • Pascal Scherrer • Kaye Walker • Daniela Liggett • Emad Monshi • Marianna Sigala • Véronique Mondou • Benjamin Taunay • Iris MaoCompletely updated and revised, Cruise Ship Tourism, 2nd Edition covers the economic, social and environmental impacts of cruising, combining the latest knowledge and research to provide a comprehensive account of the subject. Despite the industry growing rapidly, there is a substantial gap in the r... More
Language: ENGCopyright: 2017