|
Showing 1 - 9 of
9 matches in All Departments
In recent years, a considerable amount of effort has been devoted
to cyber-threat protection of computer systems which is one of the
most critical cybersecurity tasks for single users and businesses
since even a single attack can result in compromised data and
sufficient losses. Massive losses and frequent attacks dictate the
need for accurate and timely detection methods. Current static and
dynamic methods do not provide efficient detection, especially when
dealing with zero-day attacks. For this reason, big data analytics
and machine intelligence-based techniques can be used. This book
brings together researchers in the field of big data analytics and
intelligent systems for cyber threat intelligence CTI and key data
to advance the mission of anticipating, prohibiting, preventing,
preparing, and responding to internal security. The wide variety of
topics it presents offers readers multiple perspectives on various
disciplines related to big data analytics and intelligent systems
for cyber threat intelligence applications. Technical topics
discussed in the book include: Big data analytics for cyber threat
intelligence and detection Artificial intelligence analytics
techniques Real-time situational awareness Machine learning
techniques for CTI Deep learning techniques for CTI Malware
detection and prevention techniques Intrusion and cybersecurity
threat detection and analysis Blockchain and machine learning
techniques for CTI
This book presents state-of-the-art research on artificial
intelligence and blockchain for future cybersecurity applications.
The accepted book chapters covered many themes, including
artificial intelligence and blockchain challenges, models and
applications, cyber threats and intrusions analysis and detection,
and many other applications for smart cyber ecosystems. It aspires
to provide a relevant reference for students, researchers,
engineers, and professionals working in this particular area or
those interested in grasping its diverse facets and exploring the
latest advances on artificial intelligence and blockchain for
future cybersecurity applications.
This book presents state-of-the-art research on artificial
intelligence and blockchain for future cybersecurity applications.
The accepted book chapters covered many themes, including
artificial intelligence and blockchain challenges, models and
applications, cyber threats and intrusions analysis and detection,
and many other applications for smart cyber ecosystems. It aspires
to provide a relevant reference for students, researchers,
engineers, and professionals working in this particular area or
those interested in grasping its diverse facets and exploring the
latest advances on artificial intelligence and blockchain for
future cybersecurity applications.
This book gathers the proceedings of the International Conference
on Information, Communication and Cybersecurity, held on November
10-11, 2021, in Khouribga, Morocco. The conference was jointly
coorganized by The National School of Applied Sciences of Sultan
Moulay Slimane University, Morocco, and Charles Darwin University,
Australia. This book provides an opportunity to account for
state-of-the-art works, future trends impacting information
technology, communications, and cybersecurity, focusing on
elucidating the challenges, opportunities, and inter-dependencies
that are just around the corner. This book is helpful for students
and researchers as well as practitioners. ICI2C 2021 was devoted to
advances in smart information technologies, communication, and
cybersecurity. It was considered a meeting point for researchers
and practitioners to implement advanced information technologies
into various industries. There were 159 paper submissions from 24
countries. Each submission was reviewed by at least three chairs or
PC members. We accepted 54 regular papers (34\%). Unfortunately,
due to limitations of conference topics and edited volumes, the
Program Committee was forced to reject some interesting papers,
which did not satisfy these topics or publisher requirements. We
would like to thank all authors and reviewers for their work and
valuable contributions. The friendly and welcoming attitude of
conference supporters and contributors made this event a success!
Today, the use of machine intelligence, expert systems, and
analytical technologies combined with Big Data is the natural
evolution of both disciplines. As a result, there is a pressing
need for new and innovative algorithms to help us find effective
and practical solutions for smart applications such as smart
cities, IoT, healthcare, and cybersecurity. This book presents the
latest advances in big data intelligence for smart applications. It
explores several problems and their solutions regarding
computational intelligence and big data for smart applications. It
also discusses new models, practical solutions,and technological
advances related to developing and transforming cities through
machine intelligence and big data models and techniques. This book
is helpful for students and researchers as well as practitioners.
The Cyber-Physical System (CPS) relates to many other popularized
technologies such as Internet of Things (IoT, IIoT),
Machine-to-Machine (M2M), Industry 4.0, which describe a vision of
connected creations that deeply unite the physical and information
domains. As a revolutionary technology, Blockchain (BC) provides a
practical solution to enable a secure and decentralized public
ledger that a huge plethora of exciting new technology applications
in several areas, such as the Internet of Things (IoT),
Cyber-Physical Systems, Manufacturing, Supply-Chain, etc.
Blockchain technology has infiltrated all areas of our lives, from
manufacturing to healthcare and beyond. In this context, this book
helps discover the various potential applications that could be
fruitful for cyber-physical system applications. It provides a
sampling of recent advances and ideas on research progress and the
practical usage of blockchain technologies in addressing
cyber-physical systems challenges and issues. It provides a
sampling of recent advances and views on research progress and the
practical usage of blockchain technologies in addressing
cyber-physical systems challenges and issues.
Today, the use of machine intelligence, expert systems, and
analytical technologies combined with Big Data is the natural
evolution of both disciplines. As a result, there is a pressing
need for new and innovative algorithms to help us find effective
and practical solutions for smart applications such as smart
cities, IoT, healthcare, and cybersecurity. This book presents the
latest advances in big data intelligence for smart applications. It
explores several problems and their solutions regarding
computational intelligence and big data for smart applications. It
also discusses new models, practical solutions,and technological
advances related to developing and transforming cities through
machine intelligence and big data models and techniques. This book
is helpful for students and researchers as well as practitioners.
This textbook covers security controls and management. It is for
courses in cyber security education that follow National Initiative
for Cybersecurity Education (NICE) work roles and framework that
adopt the Competency-Based Education (CBE) method. The book follows
the CBE general framework, meaning each chapter contains three
sections, knowledge and questions, and skills/labs for skills and
sbilities. The author makes an explicit balance between knowledge
and skills material in information security, giving readers
immediate applicable skills. The book is divided into several
parts, including: Information Assurance / Encryption; Information
Systems Security Management; Information Systems / Network
Security; Information Technology Management; IT Management; and IT
Risk Management.
This textbook covers security controls and management. It is for
courses in cyber security education that follow National Initiative
for Cybersecurity Education (NICE) work roles and framework that
adopt the Competency-Based Education (CBE) method. The book follows
the CBE general framework, meaning each chapter contains three
sections, knowledge and questions, and skills/labs for skills and
sbilities. The author makes an explicit balance between knowledge
and skills material in information security, giving readers
immediate applicable skills. The book is divided into several
parts, including: Information Assurance / Encryption; Information
Systems Security Management; Information Systems / Network
Security; Information Technology Management; IT Management; and IT
Risk Management.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|