Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Handbook of Research on Machine and Deep Learning Applications for Cyber Security
  • Language: en
  • Pages: 506

Handbook of Research on Machine and Deep Learning Applications for Cyber Security

  • Type: Book
  • -
  • Published: 2019-07-26
  • -
  • Publisher: IGI Global

As the advancement of technology continues, cyber security continues to play a significant role in today’s world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.

Proceedings of International Conference on Machine Intelligence and Data Science Applications
  • Language: en
  • Pages: 813

Proceedings of International Conference on Machine Intelligence and Data Science Applications

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, on September 4 and 5, 2020. The book starts by addressing the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, and speech and gesture analysis have been included with upfront details. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber physical system and smart agriculture. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.

Information and Communication Technologies
  • Language: en
  • Pages: 723

Information and Communication Technologies

This book constitutes the proceedings of the International Conference on Information and Communication Technologies held in Kochi, Kerala, India in September 2010.

Research Anthology on Machine Learning Techniques, Methods, and Applications
  • Language: en
  • Pages: 1516

Research Anthology on Machine Learning Techniques, Methods, and Applications

  • Type: Book
  • -
  • Published: 2022-05-13
  • -
  • Publisher: IGI Global

Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.

Identity Theft: Breakthroughs in Research and Practice
  • Language: en
  • Pages: 453

Identity Theft: Breakthroughs in Research and Practice

  • Type: Book
  • -
  • Published: 2016-09-27
  • -
  • Publisher: IGI Global

The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual’s finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one’s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.

Information Processing and Management
  • Language: en
  • Pages: 693

Information Processing and Management

  • Type: Book
  • -
  • Published: 2010-04-03
  • -
  • Publisher: Springer

It is my pleasure to write the preface for Information Processing and Management. This book aims to bring together innovative results and new research trends in inf- mation processing, computer science and management engineering. If an information processing system is able to perform useful actions for an obj- tive in a given domain, it is because the system knows something about that domain. The more knowledge it has, the more useful it can be to its users. Without that kno- edge, the system itself is useless. In the information systems field, there is conceptual modeling for the activity that elicits and describes the general knowledge a particular information system needs to know. The main objective of conceptual modeling is to obtain that description, which is called a conceptual schema. Conceptual schemas are written in languages called conceptual modeling languages. Conceptual modeling is an important part of requi- ments engineering, the first and most important phase in the development of an inf- mation system.

Security and Privacy Issues in Sensor Networks and IoT
  • Language: en
  • Pages: 323

Security and Privacy Issues in Sensor Networks and IoT

  • Type: Book
  • -
  • Published: 2019-10-25
  • -
  • Publisher: IGI Global

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.

Malware Analysis and Intrusion Detection in Cyber-Physical Systems
  • Language: en
  • Pages: 451

Malware Analysis and Intrusion Detection in Cyber-Physical Systems

  • Type: Book
  • -
  • Published: 2023-09-26
  • -
  • Publisher: IGI Global

Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.

Biometric Authentication in Online Learning Environments
  • Language: en
  • Pages: 334

Biometric Authentication in Online Learning Environments

  • Type: Book
  • -
  • Published: 2019-02-15
  • -
  • Publisher: IGI Global

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.

Advancements in Smart Computing and Information Security
  • Language: en
  • Pages: 317

Advancements in Smart Computing and Information Security

This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.