|
Showing 1 - 15 of
15 matches in All Departments
This book explores the intersection of cybersecurity and education
technologies, providing practical solutions, detection techniques,
and mitigation strategies to ensure a secure and protected learning
environment in the face of evolving cyber threats. With a wide
range of contributors covering topics from immersive learning to
phishing detection, this book is a valuable resource for
professionals, researchers, educators, students, and policymakers
interested in the future of cybersecurity in education. Provides
practical solutions, detection techniques, and mitigation
strategies to ensure a secure and protected learning environment in
the face of evolving cyber threats. Covers a wide range of topics
including immersive learning, cybersecurity education, and malware
detection, making it a valuable resource for professionals,
researchers, educators, students, and policymakers. Offers both
theoretical foundations and practical guidance for fostering a
secure and protected environment for educational advancements in
the digital age. Addresses the need for cybersecurity in education
in the context of worldwide changes in education sources and
advancements in technology. Highlights the significance of
integrating cybersecurity into educational practices and protecting
sensitive information to ensure students' performance prediction
systems are not misused.
Computational Intelligence for Medical Internet of Things (MIoT)
Applications: Machine Intelligence Applications for IoT in
Healthcare explores machine intelligence techniques necessary for
effective MIoT research and practice, taking a practical approach
for practitioners and students entering the field. This book
investigates advanced concepts and applications in the MIoT field,
guiding readers through emerging developments and future trends. A
wide range of international authors guide readers through advanced
concepts, including deep learning, neural network, and big data
analytic approaches for the classification, indexing, retrieval,
analysis, and inferencing of healthcare data.
This book presents techniques and security challenges of chaotic
systems and their use in cybersecurity. It presents the
state-of-the-art and the latest discoveries in the field of chaotic
systems and methods and proposes new models, practical solutions,
and technological advances related to new chaotic dynamical
systems. The book can be used as part of the bibliography of the
following courses: - Cybersecurity - Cryptography - Networks and
Communications Security - Nonlinear Circuits - Nonlinear Systems
and Applications
This book gathers the proceedings of the International Conference
on Information, Communication and Cybersecurity, held on November
10-11, 2021, in Khouribga, Morocco. The conference was jointly
coorganized by The National School of Applied Sciences of Sultan
Moulay Slimane University, Morocco, and Charles Darwin University,
Australia. This book provides an opportunity to account for
state-of-the-art works, future trends impacting information
technology, communications, and cybersecurity, focusing on
elucidating the challenges, opportunities, and inter-dependencies
that are just around the corner. This book is helpful for students
and researchers as well as practitioners. ICI2C 2021 was devoted to
advances in smart information technologies, communication, and
cybersecurity. It was considered a meeting point for researchers
and practitioners to implement advanced information technologies
into various industries. There were 159 paper submissions from 24
countries. Each submission was reviewed by at least three chairs or
PC members. We accepted 54 regular papers (34\%). Unfortunately,
due to limitations of conference topics and edited volumes, the
Program Committee was forced to reject some interesting papers,
which did not satisfy these topics or publisher requirements. We
would like to thank all authors and reviewers for their work and
valuable contributions. The friendly and welcoming attitude of
conference supporters and contributors made this event a success!
This book bridges principles and real-world applications, while
also providing thorough theory and technology for the development
of artificial intelligence and robots. A lack of cross-pollination
between AI and robotics research has led to a lack of progress in
both fields. Now that both technologies have made significant
strides, there is increased interest in combining the two domains
in order to create a new integrated AI and robotics trend. In order
to achieve wiser urbanization and more sustainable development, AI
in smart cities will play a significant part in equipping the
cities with advanced features that will allow residents to safely
move about, stroll, shop, and enjoy a more comfortable way of life.
If you are a student, researcher, engineer, or professional working
in this field, or if you are just curious in the newest
advancements in robotics and artificial intelligence for
cybersecurity, this book is for you!
This book presents techniques and security challenges of chaotic
systems and their use in cybersecurity. It presents the
state-of-the-art and the latest discoveries in the field of chaotic
systems and methods and proposes new models, practical solutions,
and technological advances related to new chaotic dynamical
systems. The book can be used as part of the bibliography of the
following courses: - Cybersecurity - Cryptography - Networks and
Communications Security - Nonlinear Circuits - Nonlinear Systems
and Applications
This book presents state-of-the-art research on security and
privacy- preserving for IoT and 5G networks and applications. The
accepted book chapters covered many themes, including traceability
and tamper detection in IoT enabled waste management networks,
secure Healthcare IoT Systems, data transfer accomplished by
trustworthy nodes in cognitive radio, DDoS Attack Detection in
Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud
Computing, biometric authentication systems for IoT applications,
and many other applications It aspires to provide a relevant
reference for students, researchers, engineers, and professionals
working in this particular area or those interested in grasping its
diverse facets and exploring the latest advances on security and
privacy- preserving for IoT and 5G networks.
This book bridges principles and real-world applications, while
also providing thorough theory and technology for the development
of artificial intelligence and robots. A lack of cross-pollination
between AI and robotics research has led to a lack of progress in
both fields. Now that both technologies have made significant
strides, there is increased interest in combining the two domains
in order to create a new integrated AI and robotics trend. In order
to achieve wiser urbanization and more sustainable development, AI
in smart cities will play a significant part in equipping the
cities with advanced features that will allow residents to safely
move about, stroll, shop, and enjoy a more comfortable way of life.
If you are a student, researcher, engineer, or professional working
in this field, or if you are just curious in the newest
advancements in robotics and artificial intelligence for
cybersecurity, this book is for you!
This book presents state-of-the-art research on security and
privacy- preserving for IoT and 5G networks and applications. The
accepted book chapters covered many themes, including traceability
and tamper detection in IoT enabled waste management networks,
secure Healthcare IoT Systems, data transfer accomplished by
trustworthy nodes in cognitive radio, DDoS Attack Detection in
Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud
Computing, biometric authentication systems for IoT applications,
and many other applications It aspires to provide a relevant
reference for students, researchers, engineers, and professionals
working in this particular area or those interested in grasping its
diverse facets and exploring the latest advances on security and
privacy- preserving for IoT and 5G networks.
Social media platforms are one of the main generators of textual
data where people around the world share their daily life
experiences and information with online society. The social,
personal, and professional lives of people on these social
networking sites generate not only a huge amount of data but also
open doors for researchers and academicians with numerous research
opportunities. This ample amount of data needs advanced machine
learning, deep learning, and intelligent tools and techniques to
receive, process, and interpret the information to resolve
real-life challenges and improve the online social lives of people.
Advanced Applications of NLP and Deep Learning in Social Media Data
bridges the gap between natural language processing (NLP), advanced
machine learning, deep learning, and online social media. It hopes
to build a better and safer social media space by making human
language available on different social media platforms intelligible
for machines with the blessings of AI. Covering topics such as
machine learning-based prediction, emotion recognition, and
high-dimensional text clustering, this premier reference source is
an essential resource for OSN service providers, psychiatrists,
psychologists, clinicians, sociologists, students and educators of
higher education, librarians, researchers, and academicians.
Social media platforms are one of the main generators of textual
data where people around the world share their daily life
experiences and information with online society. The social,
personal, and professional lives of people on these social
networking sites generate not only a huge amount of data but also
open doors for researchers and academicians with numerous research
opportunities. This ample amount of data needs advanced machine
learning, deep learning, and intelligent tools and techniques to
receive, process, and interpret the information to resolve
real-life challenges and improve the online social lives of people.
Advanced Applications of NLP and Deep Learning in Social Media Data
bridges the gap between natural language processing (NLP), advanced
machine learning, deep learning, and online social media. It hopes
to build a better and safer social media space by making human
language available on different social media platforms intelligible
for machines with the blessings of AI. Covering topics such as
machine learning-based prediction, emotion recognition, and
high-dimensional text clustering, this premier reference source is
an essential resource for OSN service providers, psychiatrists,
psychologists, clinicians, sociologists, students and educators of
higher education, librarians, researchers, and academicians.
Social media sites are constantly evolving with huge amounts of
scattered data or big data, which makes it difficult for
researchers to trace the information flow. It is a daunting task to
extract a useful piece of information from the vast unstructured
big data; the disorganized structure of social media contains data
in various forms such as text and videos as well as huge real-time
data on which traditional analytical methods like statistical
approaches fail miserably. Due to this, there is a need for
efficient data mining techniques that can overcome the shortcomings
of the traditional approaches. Data Mining Approaches for Big Data
and Sentiment Analysis in Social Media encourages researchers to
explore the key concepts of data mining, such as how they can be
utilized on online social media platforms, and provides advances on
data mining for big data and sentiment analysis in online social
media, as well as future research directions. Covering a range of
concepts from machine learning methods to data mining for big data
analytics, this book is ideal for graduate students, academicians,
faculty members, scientists, researchers, data analysts, social
media analysts, managers, and software developers who are seeking
to learn and carry out research in the area of data mining for big
data and sentiment.
Social media sites are constantly evolving with huge amounts of
scattered data or big data, which makes it difficult for
researchers to trace the information flow. It is a daunting task to
extract a useful piece of information from the vast unstructured
big data; the disorganized structure of social media contains data
in various forms such as text and videos as well as huge real-time
data on which traditional analytical methods like statistical
approaches fail miserably. Due to this, there is a need for
efficient data mining techniques that can overcome the shortcomings
of the traditional approaches. Data Mining Approaches for Big Data
and Sentiment Analysis in Social Media encourages researchers to
explore the key concepts of data mining, such as how they can be
utilized on online social media platforms, and provides advances on
data mining for big data and sentiment analysis in online social
media, as well as future research directions. Covering a range of
concepts from machine learning methods to data mining for big data
analytics, this book is ideal for graduate students, academicians,
faculty members, scientists, researchers, data analysts, social
media analysts, managers, and software developers who are seeking
to learn and carry out research in the area of data mining for big
data and sentiment.
This book gathers the proceedings of the International conference
on Cybersecurity, Cybercrimes, and Smart Emerging Technologies,
held on May 10-11, 2022, in Riyadh, Saudi Arabia. The conference
organized by the College of Computer Science of Prince Sultan
University, Saudi Arabia. This book provides an opportunity to
account for state-of-the-art works, future trends impacting
cybersecurity, cybercrimes, and smart emerging technologies, that
concern to organizations and individuals, thus creating new
research opportunities, focusing on elucidating the challenges,
opportunities, and inter-dependencies that are just around the
corner. This book is helpful for students and researchers as well
as practitioners. CCSET 2022 was devoted to advances in
cybersecurity, cybercime, and smart emerging technologies. It was
considered a meeting point for researchers and practitioners to
implement advanced information technologies into various
industries. There were 89 paper submissions from 25 countries. Each
submission was reviewed by at least three chairs or PC members. We
accepted 38 regular papers (42%). Unfortunately, due to limitations
of conference topics and edited volumes, the Program Committee was
forced to reject some interesting papers, which did not satisfy
these topics or publisher requirements. We would like to thank all
authors and reviewers for their work and valuable contributions.
The friendly and welcoming attitude of conference supporters and
contributors made this event a success!
The integration of new technologies is resulting in an increased
demand for security and authentication in all types of data
communications. Cybersecurity is the protection of networks and
systems from theft. Biometric technologies use unique traits of
particular parts of the body such facial recognition, iris,
fingerprints and voice to identify individuals' physical and
behavioural characteristics. Although there are many challenges
associated with extracting, storing and processing such data,
biometric and cybersecurity technologies along with artificial
intelligence (AI) are offering new approaches to verification
procedures and mitigating security risks. This book presents
cutting-edge research on the use of AI for biometrics and
cybersecurity including machine and deep learning architectures,
emerging applications and ethical and legal concerns. Topics
include federated learning for enhanced cybersecurity; artificial
intelligence-based biometric authentication using ECG signal; deep
learning for email phishing detection methods; biometrics for
secured IoT systems; intelligent authentication using graphical
one-time-passwords; and AI in social cybersecurity. Artificial
Intelligence for Biometrics and Cybersecurity: Technology and
applications is aimed at artificial intelligence, biometrics and
cybersecurity experts, industry and academic researchers, network
security engineers, cybersecurity professionals, and advanced
students and newcomers to the field interested in the newest
advancements in artificial intelligence for cybersecurity and
biometrics.
|
You may like...
Tenet
John David Washington, Robert Pattinson
Blu-ray disc
(1)
R54
Discovery Miles 540
|