Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Artificial Intelligence for Intrusion Detection Systems
  • Language: en
  • Pages: 218

Artificial Intelligence for Intrusion Detection Systems

  • Type: Book
  • -
  • Published: 2023-10-16
  • -
  • Publisher: CRC Press

This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS). Features: A systematic overview of the state-of-the-art IDS Proper explanation of novel cyber attacks which are much different from classical cyber attacks Proper and in-depth discussion of AI in the field of cybersecurity Introduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementations Covers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks. This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security.

Applications of Blockchain in Healthcare
  • Language: en
  • Pages: 277

Applications of Blockchain in Healthcare

This book discusses applications of blockchain in healthcare sector. The security of confidential and sensitive data is of utmost importance in healthcare industry. The introduction of blockchain methods in an effective manner will bring secure transactions in a peer-to-peer network. The book also covers gaps of the current available books/literature available for use cases of Distributed Ledger Technology (DLT) in healthcare. The information and applications discussed in the book are immensely helpful for researchers, database professionals, and practitioners. The book also discusses protocols, standards, and government regulations which are very useful for policymakers. /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div /div

Predictive Data Security using AI
  • Language: en
  • Pages: 222

Predictive Data Security using AI

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, machine learning (ML) and deep learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experi...

Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 1805

Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2019-09-06
  • -
  • Publisher: IGI Global

The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.

Machine Learning, Image Processing, Network Security and Data Sciences
  • Language: en
  • Pages: 372
Emerging Wireless Communication and Network Technologies
  • Language: en
  • Pages: 359

Emerging Wireless Communication and Network Technologies

  • Type: Book
  • -
  • Published: 2018-06-09
  • -
  • Publisher: Springer

The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. In turn, the book addresses different algorithms and methodologies which could be beneficial in implementing 5G Mobile Communication, Vehicular Ad-hoc Networks (VANET), Reliable Cooperative Networks, Delay Tolerant Networks (DTN) and many more contexts related to advanced communications. It then addresses the prominence of wireless communication in connection with the Internet of Things (IoT), Mobile Opportunistic Networks and Cognitive Radio Networks (CRN). Lastly, it presents the new horizons in architecture and building protocols for Li-Fi (Light-Fidelity) and Wearable Sensor Technology.

Algorithms in Advanced Artificial Intelligence
  • Language: en
  • Pages: 547

Algorithms in Advanced Artificial Intelligence

  • Type: Book
  • -
  • Published: 2024-07-08
  • -
  • Publisher: CRC Press

The most common form of severe dementia, Alzheimer’s disease (AD), is a cumulative neurological disorder because of the degradation and death of nerve cells in the brain tissue, intelligence steadily declines and most of its activities are compromised in AD. Before diving into the level of AD diagnosis, it is essential to highlight the fundamental differences between conventional machine learning (ML) and deep learning (DL). This work covers a number of photo-preprocessing approaches that aid in learning because image processing is essential for the diagnosis of AD. The most crucial kind of neural network for computer vision used in medical image processing is called a Convolutional Neural Network (CNN). The proposed study will consider facial characteristics, including expressions and eye movements using the diffusion model, as part of CNN’s meticulous approach to Alzheimer’s diagnosis. Convolutional neural networks were used in an effort to sense Alzheimer’s disease in its early stages using a big collection of pictures of facial expressions.

Distributed Computing in Big Data Analytics
  • Language: en
  • Pages: 166

Distributed Computing in Big Data Analytics

  • Type: Book
  • -
  • Published: 2017-08-29
  • -
  • Publisher: Springer

Big data technologies are used to achieve any type of analytics in a fast and predictable way, thus enabling better human and machine level decision making. Principles of distributed computing are the keys to big data technologies and analytics. The mechanisms related to data storage, data access, data transfer, visualization and predictive modeling using distributed processing in multiple low cost machines are the key considerations that make big data analytics possible within stipulated cost and time practical for consumption by human and machines. However, the current literature available in big data analytics needs a holistic perspective to highlight the relation between big data analyti...

Applied Cryptography and Network Security Workshops
  • Language: en
  • Pages: 413

Applied Cryptography and Network Security Workshops

None

Cyber-Physical Systems
  • Language: en
  • Pages: 623

Cyber-Physical Systems

  • Type: Book
  • -
  • Published: 2015-12-01
  • -
  • Publisher: CRC Press

In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system. This allows distributed computing using wireless devices. Cyber-Physical Systems-A Computational Perspective examines various developments of CPS that are impacting our daily