Search Results - Security and privacy Software and application security Software security engineering

Search alternatives:

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Internet of Things and Big Data Analytics Toward Next-Generation Intelligence

    ISBN: 9783319604350
    ISSN: 2197-6503 ;
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  2. 2

    UX Fundamentals for Non-UX Professionals User Experience Principles for Managers, Writers, Designers, and Developers / by Stull, Edward

    ISBN: 9781484238110
    Published: Berkeley, CA : Apress, 2018.

    Get full text
    Electronic eBook
  3. 3

    Big Data Analytics Proceedings of CSI 2015 /

    ISBN: 9789811066207
    ISSN: 2194-5357 ;
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…Title of the Papers along with the Name of the Authors -- Need for Developing Intelligent Interfaces for Big Data Analytics in the Micro Finance Industry -- Unified Resource Descriptor over KAAS Framework Refining Cloud Dynamics -- An Adoptable and Secure Intelligent Smart Card Framework for Internet of Things and Cloud Computing -- A Framework for Ontology Learning from Taxonomic Data -- Leveraging Map-Reduce with Column Oriented Stores: Study of Solutions and Benefits -- Hadoop: Solution to Unstructured Data Handling -- Task Based Load Balancing Algorithm by Efficient Utilization of VMs in Cloud Computing -- A Load Balancing Algorithm Based on Processing Capacities of VMs in Cloud Computing -- Package Based Approach for Load Balancing in Cloud Computing -- Workload Prediction of e-Business Websites on Cloud Using Different Methods of ANN -- Data Security in Cloud Based Analytics -- Ontology Based Ranking in Search Engine -- Hidden Data extraction Using URL Templates Processing -- Automatic Generation of Ontology for Extracting Hidden Web Pages -- Importance of SLA in Cloud Computing -- A Survey on Cloud Computing -- Adapting & Reducing Cost in Cloud Paradigm (ARCCP) -- Power Aware Based Workflow Model of Grid Computing Using Ant Based Heuristic Approach -- Image Categorization Using Improved Data Mining Technique -- An Effective Hybrid Encryption Algorithm for Ensuring Cloud Data Security -- Big Data Analytics: Recent and Emerging Application in Services Industry -- An Analysis of Resource Aware Adaptive Scheduling for HPC Clusters with Hadoop -- Analytical and Perspective Approach of Big Data in Cloud Computing -- Implementation of CouchDB Views -- Evolution of FOAF and SIOC in Semantic Web: A Survey -- Classification of e-Commerce Products Using Rep-Tree And K-Mean Hybrid Approach -- A Study of Factors Affecting MapReduce Scheduling -- Outlier Detection in Agriculture Domain: Application and Techniques -- A Framework for Twitter Data Analysis -- Web Structure Mining Algorithms: A Survey -- Big Data Analytics via IoT with Cloud Service -- A Proposed Contextual Model for Big Data Analysis Using Advanced Analytics -- Ranked Search over Encrypted Cloud Data in Azure Using Secure kNN -- DCI3 Model for Privacy Preserving in Big Data -- Study of Sentiment Analysis Using Hadoop -- OPTIMA(OPinionated Tweet Implied Mining and Analysis) - An Innovative Tool to Automate Sentiment Analysis -- Mobile Agent Based MapReduce Framework for Big Data Processing -- Review of Parallel Apriori Algorithm on Map Reduce Framework for Performance Enhancement -- A Novel Approach to Realize Internet of Intelligent Things -- An Innovative Approach of Web Page Ranking Using Hadoop and MapReduce Based Cloud Framework -- SAASQUAL: A Quality Model for Evaluating SaaS on the Cloud Computing Environment -- Scalable Aspect Based Summarization in the Hadoop Environment -- Parallel Mining of Frequent Itemsets from Memory Mapped Files -- Handling Smurfing Through Big Data -- A Novel Approach for Semantic Prefetching Using Semantic Information and Semantic Association -- Optimized Cost Model with Optimal Resource Usage for Cloud -- Understanding Live Migration Techniques Intended for Resource Interference Minimization in Virtualized Cloud Environment -- Cloud Security Issues and Challenges -- A Novel Approach to Protect Cloud Environments Against DDOS Attacks -- An Approach for Workflow Scheduling in Cloud Using ACO -- Data Type Identification and Extension Validator Framework Model for Public Cloud Storage -- Robust Fuzzy Neuro System for Big Data Analytics -- Deployment of Cloud Using Open Source Virtualization: Study of VM Migration Methods and Benefits -- Implementation of Category-wise Focused Web Crawler -- MAYA: An Approach for Energy and Cost Optimization for Mobile Cloud Computing Environments -- Load Balancing in Cloud - A Systematic Review -- Cloud-Based Big Data Analytics - A Survey of Current Research and Future Directions -- Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler's Theorem and Application in Cloud Computing -- Big Data: Issues, Challenges and Techniques in Business Intelligence -- Cloud Computing in Bioinformatics and Big Data Analytics: Current Status and Future Research -- Generalized Query Processing Mechanism in CDBMS -- Deliberative Study of Security Issues in Cloud Computing -- Green Cloud Computing: An Overview -- Literature Review of QoS with Load Balancing in Cloud Computing Environment -- WAMLB: Weighted Active Monitoring Load Balancing in Cloud Computing -- Applications of Attribute Based Encryption in Cloud Computing Environment -- Query Optimization: Issues and Challenges in Mining of Distributed Data -- Comprehensive Study of Cloud Computing and Related Security Issues -- Healthcare Data Analysis Using R and MongoDB -- Data Mining Tools and Techniques for Mining Software Repositories: A Systematic Review -- SWOT Analysis of Cloud Computing Environment -- A Review on Quality of Service in Cloud Computing -- Association Rule Mining for Finding Admission Tendency of Engineering Student with Pattern Growth Appraoch -- Integrated Effect of Nearest Neighbors and Distance Measures in k-NN Algorithm.…”

    Get full text
    Electronic eBook
  4. 4

    Frontier Computing Theory, Technologies and Applications (FC 2017) /

    ISBN: 9789811073984
    ISSN: 1876-1100 ;
    Published: Singapore : Springer Singapore , 2018.

    Get full text
    Electronic eBook
  5. 5

    Frontier Computing Theory, Technologies and Applications FC 2016 /

    ISBN: 9789811031878
    ISSN: 1876-1100 ;
    Published: Singapore : Springer Singapore , 2018.

    Get full text
    Electronic eBook
  6. 6

    Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia...

    ISBN: 9783319638560
    ISSN: 2190-3018 ;
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  7. 7

    Fast-track innovation and commercialization : tools and techniques / by Datta, Biplab Kumar

    ISBN: 9783031303753
    Published: Cham : Springer, 2023.
    Table of Contents: “…E.3.8 Security and Privacy Requirements -- E.3.9 System Environment Requirements -- E.3.10 Computer Resource Requirements -- E.3.10.1 Computer Hardware Requirements -- E.3.10.2 Computer Hardware Resource Utilization Requirements -- E.3.10.3 Computer Software Requirements -- E.3.10.4 Computer Communications Requirements -- E.3.11 System Quality Factors -- E.3.12 Design and Construction Constraints -- E.3.13 Personnel Related Requirements -- E.3.14 Training Related Requirements -- E.3.15 Logistics Related Requirements -- E.3.16 Other Requirements -- E.3.17 Packaging Requirements -- E.3.18 Statutory, Regulatory, and Certification Requirements -- E.3.18.1 Statutory Requirements -- E.3.18.2 Regulatory Requirements -- E.3.18.3 Certification Requirements -- E.3.19 Precedence and Criticality of Requirements -- E.3.20 Demilitarization and Disposal -- E.4 Verification Provisions -- E.4.1 Verification Methods -- E.4.1.1 Demonstration -- E.4.1.2 Test -- E.4.1.3 Analysis -- E.4.1.4 Inspection -- E.4.1.5 Special Verification Methods -- E.5 Requirements Traceability -- E.5.1 Traceability to Capability Document or System Specification -- E.5.2 Traceability to Subsystems Requirements -- E.6 Appendix Section -- E.6.1 Appendix A-Acronyms and Definitions -- E.6.2 Appendix B-Key Performance Parameters/Key System Attributes -- E.6.3 Appendix C-Requirements Traceability Matrices -- E.6.4 Appendix D-Verification Matrices -- Appendix F A3 Template -- Appendix G Risk Register -- Index.…”

    Get full text
    eBook