You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world’s attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market t...
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of OC always onOCO access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore.
This book constitutes the proceedings of the 17th International Conference on Discovery Science, DS 2014, held in Bled, Slovenia, in October 2014. The 30 full papers included in this volume were carefully reviewed and selected from 62 submissions. The papers cover topics such as: computational scientific discovery; data mining and knowledge discovery; machine learning and statistical methods; computational creativity; mining scientific data; data and knowledge visualization; knowledge discovery from scientific literature; mining text, unstructured and multimedia data; mining structured and relational data; mining temporal and spatial data; mining data streams; network analysis; discovery informatics; discovery and experimental workflows; knowledge capture and scientific ontologies; data and knowledge integration; logic and philosophy of scientific discovery; and applications of computational methods in various scientific domains.
This book constitutes the refereed proceedings of the 10th IAPR TC3 International Workshop on Artificial Neural Networks in Pattern Recognition, ANNPR 2022, held in Dubai, UAE, in November 2022. The 16 revised full papers presented were carefully reviewed and selected from 24 submissions. The conference presents papers on subject such as pattern recognition and machine learning based on artificial neural networks.
The joint conference, ICWLHN 2002 and ICN 2002, covers a wide variety of technical sessions covering all aspects of networking technology. It features some of the world's most dynamic presenters, including leading experts such as Norman Abramson (inventor of the first access protocol ? the ALOHA protocol) and Daniel Awduche (pioneer of the MPLambdaS concept, now referred to as GMPLS). The proceedings for this joint conference is accessible to engineers, practitioners, scientists, as well as industry professionals from manufacturers to service providers.
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and web applications. The authors explain how to identify and exploit such problems and they show different countermeasures and their implementation. The reader thus gains a detailed understanding of how vulnerabilities arise and practical experience tackling them. After presenting the basics of security principles, virtual environments, and network services, the authors explain the core security principles...
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2021), held at Hanoi in Vietnam. It includes peer-reviewed high-quality articles on intelligent system and networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include—foundations of computer science; computational intelligence language and speech processing; software engineering software development methods; wireless communications signal processing for communications; electronics track IoT and sensor systems embedded systems; etc.
The classic reference work that provides annually updated information on the countries of the world.