Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Soft computing and nature-inspired computing both play a significant role in developing a better understanding to machine learning. When studied together, they can offer new perspectives on the learning process of machines. The Handbook of Research on Soft Computing and Nature-Inspired Algorithms is an essential source for the latest scholarly research on applications of nature-inspired computing and soft computational systems. Featuring comprehensive coverage on a range of topics and perspectives such as swarm intelligence, speech recognition, and electromagnetic problem solving, this publication is ideally designed for students, researchers, scholars, professionals, and practitioners seeking current research on the advanced workings of intelligence in computing systems.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book highlights the recent research on hybrid intelligent systems and their various practical applications. It presents 34 selected papers from the 18th International Conference on Hybrid Intelligent Systems (HIS 2019) and 9 papers from the 15th International Conference on Information Assurance and Security (IAS 2019), which was held at VIT Bhopal University, India, from December 10 to 12, 2019. A premier conference in the field of artificial intelligence, HIS - IAS 2019 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 20 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them. Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include: * Machine-to-Machine Communications * IoT Architecture * Identity of Things * Block Chain * Parametric Cryptosystem * Software and Cloud Components
This book constitutes the thoroughly refereed proceedings of the Second Iberoamerican Conference, KGSWC 2020, held in Merida, Mexico, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 15 papers presented were carefully reviewed and selected from 45 submissions. The papers cover research and practices in several fields of AI, such as knowledge representation and reasoning, natural language processing/text mining, machine/deep learning, semantic web, and knowledge graphs.
|
You may like...
|