You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 19th EPIA Conference on Artificial Intelligence, EPIA 2019, held in Funchal, Madeira, Portugal, in September 2019. The 119 revised full papers and 6 short papers presented were carefully reviewed and selected from a total of 252 submissions. The papers are organized in 18 tracks devoted to the following topics: AIEd - Artificial Intelligence in Education, AI4G - Artificial Intelligence for Games, AIoTA - Artificial Intelligence and IoT in Agriculture, AIL - Artificial Intelligence and Law, AIM - Artificial Intelligence in Medicine, AICPDES - Artificial Intelligence in Cyber-Physical and Distributed Embedded Systems, AIPES - Artificial Int...
This book constitutes the refereed proceedings of the 22nd International Conference on Applications of Evolutionary Computation, EvoApplications 2019, held in Leipzig, Germany, in April 2019, co-located with the Evo*2019 events EuroGP, EvoCOP and EvoMUSART. The 44 revised full papers presented were carefully reviewed and selected from 66 submissions. They were organized in topical sections named: Engineering and Real World Applications; Games; General; Image and Signal Processing; Life Sciences; Networks and Distributed Systems; Neuroevolution and Data Analytics; Numerical Optimization: Theory, Benchmarks, and Applications; Robotics.
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed de...
The six-volume set LNCS 10404-10409 constitutes the refereed proceedings of the 17th International Conference on Computational Science and Its Applications, ICCSA 2017, held in Trieste, Italy, in July 2017. The 313 full papers and 12 short papers included in the 6-volume proceedings set were carefully reviewed and selected from 1052 submissions. Apart from the general tracks, ICCSA 2017 included 43 international workshops in various areas of computational sciences, ranging from computational science technologies to specific areas of computational sciences, such as computer graphics and virtual reality. Furthermore, this year ICCSA 2017 hosted the XIV International Workshop On Quantum Reactive Scattering. The program also featured 3 keynote speeches and 4 tutorials.
This book constitutes the refereed proceedings of the 14th European Conference on Genetic Programming, EuroGP 2011, held in Torino, Italy, in April 2011 co-located with the Evo* 2011 events. This 20 revised full papers presented together with 9 poster papers were carefully reviewed and selected from 59 submissions. The wide range of topics in this volume reflect the current state of research in the field, including representations, theory, novel operators and techniques, self organization, and applications.
The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event. Computational Science is the main pillar of most of the present research, industrial and commercial applications, and plays a unique role in exploiting ICT innovative technologies. The 466 full papers and 32 short papers presented were carefully reviewed and selected from 1450 submissions. Apart from the general track, ICCSA 2020 also include 52 workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as software engineering, security, machine learning and artificial intelligence, blockchain technologies, and of applications in many fields.
This book, written by leading international researchers of evolutionary approaches to machine learning, explores various ways evolution can address machine learning problems and improve current methods of machine learning. Topics in this book are organized into five parts. The first part introduces some fundamental concepts and overviews of evolutionary approaches to the three different classes of learning employed in machine learning. The second addresses the use of evolutionary computation as a machine learning technique describing methodologic improvements for evolutionary clustering, classification, regression, and ensemble learning. The third part explores the connection between evoluti...
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy t...
The Fuzzy Systems and Data Mining (FSDM) conference is an annual event encompassing four main themes: fuzzy theory, algorithms and systems, which includes topics like stability, foundations and control; fuzzy application, which covers different kinds of processing as well as hardware and architectures for big data and time series and has wide applicability; the interdisciplinary field of fuzzy logic and data mining, encompassing applications in electrical, industrial, chemical and engineering fields as well as management and environmental issues; and data mining, outlining new approaches to big data, massive data, scalable, parallel and distributed algorithms. The annual conference provides ...
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The...