You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Extreme Programming has come a long way since its ?rst use in the C3 project almost 10 years ago. Agile methods have found their way into the mainstream, and at the end of last year we saw the second edition of Kent Beck’s book on Extreme Programming, containing a major refactoring of XP. This year, the 6th International Conference on Extreme Programming and Agile Processes in Software Engineering took place June 18–23 in She?eld. As in the yearsbefore, XP 2005provideda unique forum for industry and academic professionals to discuss their needs and ideas on Extreme Programming and - ile methodologies. These proceedings re?ect the activities during the conference which ranged from present...
This book constitutes the refereed proceedings of the 7th International Conference on Product-Focused Software Process Improvement, PROFES 2006, held in Amsterdam, June 2006. The volume presents 26 revised full papers and 12 revised short papers together with 6 reports on workshops and tutorials. The papers constitute a balanced mix of academic and industrial aspects, organized in topical sections on decision support, embedded software and system development, measurement, process improvement, and more.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
This is an open access book. The 2nd International Conference on Emerging Trends in Engineering (ICETE 2023) will be held in-person from April 28-30, 2023 at University College of Engineering, Osmania University, Hyderabad, India. Since its inception in 2019, The International Conference on Emerging Trends in Engineering (ICETE) has established to enhance the information exchange of theoretical research and practical advancements at national and international levels in the fields of Bio-Medical, Civil, Computer Science, Electrical, Electronics & Communication Engineering, Mechanical and Mining Engineering. This encourages and promotes professional interaction among students, scholars, resear...
This book constitutes the refereed proceedings of the Third International Symposium on End-User Development, IS-EUD 2011, held in Torre Canne, Italy, in June 2011. The 14 long papers and 21 short papers presented were carefully reviewed and selected for inclusion in the book. In addition the volume contains 2 keynote speeches, 14 doctoral consortia, and information on 3 workshops. The contributions are organized in topical sections on mashups, frameworks, users as co-designers, infrastructures, methodologies and guidelines, beyond the desktop, end-user development in the workplace, meta-design, and supporting end-user developers.
Many claims are made about how certain tools, technologies, and practices improve software development. But which claims are verifiable, and which are merely wishful thinking? In this book, leading thinkers such as Steve McConnell, Barry Boehm, and Barbara Kitchenham offer essays that uncover the truth and unmask myths commonly held among the software development community. Their insights may surprise you. Are some programmers really ten times more productive than others? Does writing tests first help you develop better code faster? Can code metrics predict the number of bugs in a piece of software? Do design patterns actually make better software? What effect does personality have on pair p...
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
The attention of many developed countries has increasingly focused on the security and protection of critical infrastructure. The use of Unmanned Systems (USs) for this purpose has been growing rapidly in recent years, as advances in technology, increased versatility and smaller size, together with the reduced risks and costs associated with removing the need for a pilot or operator on board, have all made these systems more attractive. This book, Monitoring and Protection of Critical Infrastructure by Unmanned Systems, presents 15 papers delivered at the NATO Advanced Training Course (ATC) of the same name hosted in Chisinau, the Republic of Moldova, from 30 May to 5 June 2022. This event w...