You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Recent developments in the fields of intelligent computing and communication have paved the way for the handling of current and upcoming problems and brought about significant technological advancements. This book presents the proceedings of IConIC 2021, the 4th International Conference on Intelligent Computing, held on 26 and 27 March 2021 in Chennai, India. The principle objective of the annual IConIC conference is to provide an international scientific forum where participants can exchange innovative ideas in relevant fields and interact in depth through discussion with their peer group. The theme of the 2021 conference and this book is ‘Smart Intelligent Computing and Communication Tec...
This book gathers high-quality papers presented at the Seventh International Conference on Smart Trends in Computing and Communications (SmartCom 2022), organized by Global Knowledge Research Foundation (GR Foundation) from January 24–25, 2023, in Jaipur, India. It covers the state-of-the-art and emerging topics in information, computer communications, and effective strategies for their use in engineering and managerial applications. It also explores and discusses the latest technological advances in, and future directions for, information and knowledge computing and its applications.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 – December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed de...
This volume constitutes the refereed proceedings of the confederated international conferences: Cooperative Information Systems (CoopIS 2013), Distributed Objects and Applications (DOA-Trusted Cloud 2013), and Ontologies, Data Bases and Applications of SEmantics (ODBASE 2013) held as part of OTM 2013 in September 2013 in Graz, Austria. The 47 revised full papers presented together with 6 short papers and 5 keynotes were carefully reviewed and selected from a total of 137 submissions. The papers are organized in topical sections on business process management; process modelling; service management; social networking; models and schemas; technical advances in cloud computing; towards trusted cloud computing; privacy for the cloud; querying and mining semantic information; semantic matching and mapping; semantic information management; semantics in use.
If you are a developer with BeagleBone experience and want to learn how to use it to set up a network and file server, then this book is ideal for you. To make the most of this book, you should be comfortable with the Linux operating system and know how to install software from the Internet, but you do not have to be a network guru.
This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move To...