You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed de...
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in diverse fields such as business, education, agriculture, and healthcare. It discusses scalability, security, layers, threats, and countermeasures in blockchain-based Internet of Things network. Elaborates on the opportunities presented by combining blockchain with artificial intelligence on the Internet of Things systems in the management of food systems, and drug supply chains Explains the management of computationally intensive tasks in blockchain-based Internet of Things through the development of lightweight protocols Presents various applications in fields including logistics and the supply chain, automobile industry, smart housing, shared economy, and agriculture Provides insights into blockchain-based Internet of Things systems, along with their features, vulnerabilities, and architectural flaws The text is primarily written for graduate students, and academic researchers working in the fields of computer science and engineering, electrical engineering, and information technology
In the fast-developing field of nanomedicine, a broad variety of materials have been used for the development of advanced delivery systems for drugs, genes, and diagnostic agents. With the recent breakthroughs in the field, we are witnessing a new age of disease management, which is governed by precise regulation of dosage and delivery. This book presents the advances in the use of lipid-based and inorganic nanomaterials for medical imaging, diagnosis, theranostics, and drug delivery. The materials discussed include liposome-scaffold systems, elastic liposomes, targeted liposomes, solid lipid nanoparticles, lipoproteins, exosomes, porous inorganic nanomaterials, silica nanoparticles, and inorganic nanohybrids. The book provides all available information about them and describes in detail their advantages and disadvantages and the areas where they could be utilized successfully.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.
None