129,95 €
129,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
65 °P sammeln
129,95 €
129,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
65 °P sammeln
Als Download kaufen
129,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
65 °P sammeln
Jetzt verschenken
129,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
65 °P sammeln
  • Format: PDF

This book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia.
The book includes research on information security problems and solutions in the field of information security management, blockchain and cryptography, anomalies activity detection, authentication and key distribution, digital forensics. The scope of research methods in information security management presents original research,…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 60.92MB
Produktbeschreibung
This book is based on the best papers accepted for presentation during the AISMA-2023: International Workshop on Advanced in Information Security Management and Applications on September 29 - October 1, 2023 in online mode at Stavropol, Krasnoyarsk, Russia.

The book includes research on information security problems and solutions in the field of information security management, blockchain and cryptography, anomalies activity detection, authentication and key distribution, digital forensics. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: social activities quality, blockchain technology, anomaly detection in wireless sensor networks, DDoS attack detection, incident regulation and trust assessment.

In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into some problems using blockchain technology in various applications. The book intends for readership specializing in the field of information security management and applications, information security methods and features.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.