|
Showing 1 - 9 of
9 matches in All Departments
The integration of new technologies is resulting in an increased
demand for security and authentication in all types of data
communications. Cybersecurity is the protection of networks and
systems from theft. Biometric technologies use unique traits of
particular parts of the body such facial recognition, iris,
fingerprints and voice to identify individuals' physical and
behavioural characteristics. Although there are many challenges
associated with extracting, storing and processing such data,
biometric and cybersecurity technologies along with artificial
intelligence (AI) are offering new approaches to verification
procedures and mitigating security risks. This book presents
cutting-edge research on the use of AI for biometrics and
cybersecurity including machine and deep learning architectures,
emerging applications and ethical and legal concerns. Topics
include federated learning for enhanced cybersecurity; artificial
intelligence-based biometric authentication using ECG signal; deep
learning for email phishing detection methods; biometrics for
secured IoT systems; intelligent authentication using graphical
one-time-passwords; and AI in social cybersecurity. Artificial
Intelligence for Biometrics and Cybersecurity: Technology and
applications is aimed at artificial intelligence, biometrics and
cybersecurity experts, industry and academic researchers, network
security engineers, cybersecurity professionals, and advanced
students and newcomers to the field interested in the newest
advancements in artificial intelligence for cybersecurity and
biometrics.
This book presents state-of-the-art research on security and
privacy- preserving for IoT and 5G networks and applications. The
accepted book chapters covered many themes, including traceability
and tamper detection in IoT enabled waste management networks,
secure Healthcare IoT Systems, data transfer accomplished by
trustworthy nodes in cognitive radio, DDoS Attack Detection in
Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud
Computing, biometric authentication systems for IoT applications,
and many other applications It aspires to provide a relevant
reference for students, researchers, engineers, and professionals
working in this particular area or those interested in grasping its
diverse facets and exploring the latest advances on security and
privacy- preserving for IoT and 5G networks.
With the rapid evolution of cyberspace, computing, communications
and sensing technologies, organizations and individuals rely more
and more on new applications such as fog and cloud computing, smart
cities, Internet of Things (IoT), collaborative computing, and
virtual and mixed reality environments. Maintaining their security,
trustworthiness and resilience to cyber-attacks has become crucial
which requires innovative and creative cyber security and
resiliency solutions. Computing algorithms have been developed to
mimic the operation of natural processes, phenomena and organisms
such as artificial neural networks, swarm intelligence, deep
learning systems, biomimicry, and more. The amazing characteristics
of these systems offer a plethora of novel methodologies and
opportunities to cope with emerging cyber challenges. This edited
book presents a timely review of the fundamentals, latest
developments and diverse applications of nature-inspired algorithms
in cyber security and resiliency. Topics include bio-inspired
collaboration and cyber security; immune-based defense and
resiliency; bio-inspired security and resiliency of network
traffic; nature inspired machine learning approach for cyber
security; nature-inspired algorithms in A.I. for malicious activity
detection; DNA-inspired characterization and detection of novel
social Twitter spambots; nature-inspired approaches for social
network security; bio-inspired cyber-security for smart grid;
nature-inspired cryptography and cryptanalysis, and more.
This book presents state-of-the-art research on security and
privacy- preserving for IoT and 5G networks and applications. The
accepted book chapters covered many themes, including traceability
and tamper detection in IoT enabled waste management networks,
secure Healthcare IoT Systems, data transfer accomplished by
trustworthy nodes in cognitive radio, DDoS Attack Detection in
Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud
Computing, biometric authentication systems for IoT applications,
and many other applications It aspires to provide a relevant
reference for students, researchers, engineers, and professionals
working in this particular area or those interested in grasping its
diverse facets and exploring the latest advances on security and
privacy- preserving for IoT and 5G networks.
|
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
|
R1,611
Discovery Miles 16 110
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 11th International
Conference on Network and System Security, NSS 2017, held in
Helsinki, Finland, in August 2017. The 24 revised full papers
presented in this book were carefully reviewed and selected from 83
initial submissions. The papers are organized in topical sections
on Cloud and IoT Security; Network Security; Platform and Hardware
Security; Crypto and Others; and Authentication and Key Management.
This volume also contains 35 contributions of the following
workshops: Security Measurements of Cyber Networks (SMCN-2017);
Security in Big Data (SECBD-2017); 5G Security and Machine Learning
(IW5GS-2017); of the Internet of Everything (SECIOE-2017).
|
|