Table of Contents
Preface
Chapter 1. A Systematic Review of Anomaly Based Techniques for Detection of Phishing Attacks
S. Selvakumar1,2 and S. Priya1
1Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India
2Indian Institute of Information Technology, Una, Himachal Pradesh, India
Chapter 2. Quantum Hypercomputation: Basic Theory and Its Applications
Takaaki Musha
Advanced Sci.-Tech. Research Organization, Yokohama, Japan
Foundation of Physics Research Center (FoPRC), Cosenza, Italy
Chapter 3. Application of Soft Sets to Assessment Problems and Topology
Michael Gr. Voskoglou
Graduate Technological Educational Institute of Western Greece, Koukouli,
Patras – Greece
Chapter 4. Digital Forensic Analysis Cybernetic Model and Metalanguage Proposal
D. Delija, G. Sirovatka and D. Tuličić
The University of Applied Science, Zagreb, Croatia
Chapter 5. Lifetime Enhancement for Phase Change Memory
Mengying Zhao, PhD
Department of Computer Science and Technology, Shandong University, Qingdao, China
Chapter 6. SCOR: A Constraint Programming Approach to Software Defined Networking
Siamak Layeghy and Marius Portmann
School of ITEE, The University of Queensland, Australia
Chapter 7. Machine Learning in Cosmology and Gravitational Wave Astronomy: Recent Trends
Alvina Burgazli, PhD, Olga Sergijenko, PhD and Iryna Vavilova, Prof.
Main Astronomical Observatory of the NAS of Ukraine, Kyiv, Ukraine
Chapter 8. Efficient Data Allocation for PCM in Processing-In-Memory Systems
Yan Wang and Keqin Li
School of Computer Science and Network Engineering, Guangzhou University, Guangzhou, China
Department of Computer Science, State University of New York, New Paltz, New York, US
Index