Illumination of Artificial Intelligence in Cybersecurity and Forensics: Lecture Notes on Data Engineering and Communications Technologies, cartea 109
Editat de Sanjay Misra, Chamundeswari Arumugamen Limba Engleză Paperback – 9 feb 2022
Din seria Lecture Notes on Data Engineering and Communications Technologies
- 20% Preț: 1491.54 lei
- 20% Preț: 994.52 lei
- 18% Preț: 1577.13 lei
- 20% Preț: 710.30 lei
- 20% Preț: 1305.93 lei
- 20% Preț: 1032.84 lei
- 20% Preț: 1291.89 lei
- 20% Preț: 1293.57 lei
- 18% Preț: 1252.76 lei
- 20% Preț: 1294.36 lei
- 18% Preț: 1856.54 lei
- 15% Preț: 585.45 lei
- 20% Preț: 1792.65 lei
- 20% Preț: 1644.99 lei
- 18% Preț: 1416.92 lei
- 20% Preț: 1314.99 lei
- 20% Preț: 1462.99 lei
- 18% Preț: 1276.45 lei
- 20% Preț: 1289.42 lei
- 20% Preț: 1324.07 lei
- 20% Preț: 1675.51 lei
- 20% Preț: 1812.44 lei
- 20% Preț: 1673.87 lei
- 20% Preț: 1648.96 lei
- 20% Preț: 648.59 lei
- 20% Preț: 1448.48 lei
- 20% Preț: 1652.74 lei
- 20% Preț: 1048.72 lei
- 20% Preț: 834.04 lei
- 20% Preț: 1464.48 lei
- 20% Preț: 1301.13 lei
- 20% Preț: 695.46 lei
- 20% Preț: 643.17 lei
- 24% Preț: 907.54 lei
- 20% Preț: 1474.68 lei
- 20% Preț: 1462.99 lei
- 20% Preț: 817.38 lei
- 20% Preț: 1196.71 lei
- 18% Preț: 1414.88 lei
- 20% Preț: 1622.38 lei
- 20% Preț: 1154.62 lei
- 18% Preț: 1245.97 lei
Preț: 820.83 lei
Preț vechi: 1026.04 lei
-20% Nou
Puncte Express: 1231
Preț estimativ în valută:
157.09€ • 162.06$ • 132.95£
157.09€ • 162.06$ • 132.95£
Carte tipărită la comandă
Livrare economică 04-18 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030934521
ISBN-10: 3030934527
Pagini: 372
Ilustrații: XV, 372 p. 115 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.54 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes on Data Engineering and Communications Technologies
Locul publicării:Cham, Switzerland
ISBN-10: 3030934527
Pagini: 372
Ilustrații: XV, 372 p. 115 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.54 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes on Data Engineering and Communications Technologies
Locul publicării:Cham, Switzerland
Cuprins
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System.- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks.- Intrusion Detection using Anomaly Detection Algorithm and Snort.- Research Perspective on Digital Forensic Tools and Investigation Process.- Intelligent Authentication Framework for Internet of Medical Things (IoMT).- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network.- A Systematic Literature Review on Face Morphing Attack Detection (MAD).- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection.- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain.- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique.- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method.- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data.- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System.- Authenticated Encryption to Prevent Cyberattacks in images.- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
Textul de pe ultima copertă
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
Caracteristici
Provides recent research on cybersecurity and cyber forensics Enables the practitioners to get connected with the artificial intelligence approach toward cybersecurity and forensics Highlights the research findings, challenges, techniques, and practices applicable in security and forensics