You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cutting-edge models for proactive cybersecurity, applying AI, learning, and network analysis to information mined from hacker communities.
This volume constitutes the refereed proceedings of the workshops which complemented the 20th Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD, held in September 2020. Due to the COVID-19 pandemic the conference and workshops were held online. The 43 papers presented in volume were carefully reviewed and selected from numerous submissions. The volume presents the papers that have been accepted for the following workshops: 5th Workshop on Data Science for Social Good, SoGood 2020; Workshop on Parallel, Distributed and Federated Learning, PDFL 2020; Second Workshop on Machine Learning for Cybersecurity, MLCS 2020, 9th International Workshop on New F...
Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book. Explore the intersection of mathematics and computer security with this engaging and accessible guide. Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s...
This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges. It further provides an in-depth investigation regarding characteristics of “Pathogenic Social Media (PSM),”by focusing on how they differ from other social bots (e.g., trolls, sybils and cyborgs) and normal users as well as how PSMs communicate to achieve their malicious goals. This book leverages sophisticated data mining and machine learning techniques for early identification of PSMs, using the relevant information produced by these bad actors. It also presents proactive intelligence with a multidisciplinary approach that combi...
Sponsored by the Communication, Information Technologies, and Media Sociology section of the American Sociological Association (CITAMS), this volume celebrates the section's thirtieth anniversary. It looks at the history of the section, reviews some of its most important themes, and sets the agenda for future discussion.
Artificial intelligence, or AI, now affects the day-to-day life of almost everyone on the planet, and continues to be a perennial hot topic in the news. This book presents the proceedings of ECAI 2023, the 26th European Conference on Artificial Intelligence, and of PAIS 2023, the 12th Conference on Prestigious Applications of Intelligent Systems, held from 30 September to 4 October 2023 and on 3 October 2023 respectively in Kraków, Poland. Since 1974, ECAI has been the premier venue for presenting AI research in Europe, and this annual conference has become the place for researchers and practitioners of AI to discuss the latest trends and challenges in all subfields of AI, and to demonstrat...
Privacy is one of the most contested concepts of our time. This book sets out a rigorous and comprehensive framework for understanding debates about privacy and our rights to it. Much of the conflict around privacy comes from a failure to recognise divergent perspectives. Some people argue about human rights, some about social conventions, others about individual preferences and still others about information and data processing. As a result, ‘privacy’ has become the focus of competing definitions, leading some to denounce the ‘disarray’ in the field. But as this book shows, disagreements about the role and value of privacy obscure a large amount of agreement on the topic. Privacy is not a technical term of law, cybersecurity or sociology, but a word in common use that adequately expresses a few simple and related ideas.
Soziale Medien bilden im zunehmenden Maß einen Ort der Austragung und diskursiven Verarbeitung gesellschaftlicher und politischer Konflikte. Extrem rechte und salafistisch-dschihadistische Akteur*innen nehmen an diesen Auseinandersetzungen teil und nutzen sie als Plattform zur Propaganda. Der Band widmet sich der Frage, wie sich Mobilisierungs- und Radikalisierungsprozesse in sozialen Medien entfalten und unter welchen Bedingungen sie zu Gewalthandlungen in der realen Welt führen können.
A systematic comparison of the 3 major economic theories—neoclassical, Keynesian, and Marxian—showing how they differ and why these differences matter in shaping economic theory and practice. Contending Economic Theories offers a unique comparative treatment of the three main theories in economics as it is taught today: neoclassical, Keynesian, and Marxian. Each is developed and discussed in its own chapter, yet also differentiated from and compared to the other two theories. The authors identify each theory's starting point, its goals and foci, and its internal logic. They connect their comparative theory analysis to the larger policy issues that divide the rival camps of theorists arou...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. H...