You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance,...
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The...
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
This book constitutes the refereed proceedings of the 11th International Conference on Field-Programmable Logic and Application, FPL 2001, held in Belfast, Northern Ireland, UK, in August 2001. The 56 revised full papers and 15 short papers presented were carefully reviewed and selected from a total of 117 submissions. The book offers topical sections on architectural framework, place and route, architecture, DSP, synthesis, encryption, runtime reconfiguration, graphics and vision, networking, processor interaction, applications, methodology, loops and systolic, image processing, faults, and arithmetic.
Welcometothe11thInternationalConferenceonTelecommunications(ICT2004)ho- ed by the city of Fortaleza (Brazil). As with other ICT events in the past, this professional meeting continues to be highly competitive and very well perceived by the international networking community, - tracting excellent contributions and active participation. This year, a total of 430 papers from 36 countries were submitted, from which 188 were accepted. Each paper was - viewed by several members of the ICT2004 Technical Program Committee. We were very pleased to receive a large percentage of top-quality contributions. Thetopicsofsubmittedpaperscoveredawidespectrumfromphotonictechniques,signal processing,cellularnet...
The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing data is generated by IoT systems such as smart cities and smart-grid applications. A fundamental research issue is how to provide a fast and efficient data analytics solution for fog-enabled IoT systems. Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective focuses on Big Data analytics in a fog-enabled-IoT system and provides a comprehensive collection of chapters that touch on different issues related to healthcare systems, cyber-threat detection, malware detection, and the security and privacy of IoT Big Data and IoT networks. This book also emphasizes and facilitates a greater understanding of various security and privacy approaches using advanced artificial intelligence and Big Data technologies such as machine and deep learning, federated learning, blockchain, and edge computing, as well as the countermeasures to overcome the vulnerabilities of the fog-enabled IoT system.
The volume contains latest research work presented at International Conference on Computing and Communication Systems (I3CS 2016) held at North Eastern Hill University (NEHU), Shillong, India. The book presents original research results, new ideas and practical development experiences which concentrate on both theory and practices. It includes papers from all areas of information technology, computer science, electronics and communication engineering written by researchers, scientists, engineers and scholar students and experts from India and abroad.
The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance...
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
th Ten years ago, the 5 edition of the EUNICE Summer School took place in Barcelona with the motto “Broadband for all.” This year, with the broadband promise already ful?lled in the city, the international workshop returned to th Barcelona in its 15 edition and focused on a polyhedrical approach to the Internet of the future. The Internet is shaping the twenty-?rst century information society. It has deeply transformed the way we learn, work and interact. All kinds of insti- tions, from universities to businesses, have been shaken by the wave of digital innovation.Leisureandsocialnetworksalsohavetheirplaceinthevirtualworld, and the younger generations cannot imagine a time when they coul...