You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.
Fuzzy logic is widely used in machine control. The term ‘fuzzy’ refers to the fact that the logic involved can deal with concepts that cannot be expressed as either ‘true’ or ‘false’, but rather as ‘partially true’. Fuzzy set theory is very suitable for modeling the uncertain duration in process simulation, as well as defining the fuzzy goals and fuzzy constraints of decision-making. It has many applications in industry, engineering and social sciences. This book presents the proceedings of the 2015 International Conference on Fuzzy Systems and Data Mining (FSDM2015), held in Shanghai, China, in December 2015. The application domain covers geography, biology, economics, medic...
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2021 was de...
This Volume contains the papers presented during the 6th International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2015 which was held in Kochi, India during December 16-18, 2015. The 51 papers presented in this Volume were carefully reviewed and selected. The 6th International Conference IBICA 2015 has been organized to discuss the state-of-the-art as well as to address various issues in the growing research field of Bio-inspired Computing which is currently one of the most exciting research areas, and is continuously demonstrating exceptional strength in solving complex real life problems. The Volume will be a valuable reference to researchers, students and practitioners in the computational intelligence field..
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 62 selected papers from the 19th International Conference on Intelligent Systems Design and Applications (ISDA 2019), which was held online. The ISDA is a premier conference in the field of computational intelligence, and the latest installment brought together researchers, engineers and practitioners whose work involves intelligent systems and their applications in industry. Including contributions by authors from 33 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at IBICA2013, the 4th International Conference on Innovations in Bio-inspired Computing and Applications. The aim of IBICA 2013 was to provide a platform for world research leaders and practitioners, to discuss the full spectrum of current theoretical developments, emerging technologies, and innovative applications of Bio-inspired Computing. Bio-inspired Computing is currently one of the most exciting research areas, and it is continuously demonstrating exceptional strength in solving complex real life problems. The main driving force of the conference is to further explore the intriguing potential of Bio-inspired Computing. IBICA 2013 was held in Ostrava, Czech Republic and hosted by the VSB - Technical University of Ostrava.
This book contains revised and extended versions of selected papers from the 8th International Conference on Agents and Artificial Intelligence, ICAART 2016, held in Rome, Italy, in February 2016. The 17 revised full papers were carefully reviewed and selected from 149 initial submissions. The papers are organized in two sections: agents and artificial intelligence. They address open research trends and highlight in an innovative manner the trends in intelligent multi-agent systems, natural language processing, and knowledge representation.
This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing. The DPM Workshop received 36 submissions from which 11 full and 5 short papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering.
Traditional computing concepts are maturing into a new generation of cloud computing systems with wide-spread global applications. However, even as these systems continue to expand, they are accompanied by overall performance degradation and wasted resources. Emerging Research in Cloud Distributed Computing Systems covers the latest innovations in resource management, control and monitoring applications, and security of cloud technology. Compiling and analyzing current trends, technological concepts, and future directions of computing systems, this publication is a timely resource for practicing engineers, technologists, researchers, and advanced students interested in the domain of cloud computing.
This book constitutes extended, revised and selected papers from the 7th Ith International Conference on Cloud Computing and Service Science, CLOSER 2017, held in Porto, Portugal, in April 2017. The 16 papers presented in this volume were carefully reviewed and selected from a total of 123 submissions. CLOSER 2017 focused on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations and available services throughout the global network.