You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES • Discusses the prominence of cyber security in human life • Discusses the significance of cyber security in the post-COVID-19 wo...
Presenting innovative research-oriented ideas, and the implementation and socioeconomic applications of internet of things-based network, Challenges and Solutions in Internet of Things-Based Smart Applications showcases smart waste management, optical technologies for internet of things and remote patient monitoring and data analysis. Presents advanced research on smart waste management using internet of things and blockchain Explains the optical technologies for internet of things and image projection on visual cortex using internet of things sensors Discusses applications in smart systems like smart automatic Covid door opening system, internet of things-based remote patient monitoring, and integrated smart reading meter Presents comprehensive review above various security techniques of internet of things Includes different applications of internet of things-based solutions in agriculture, healthcare, and wireless network This text is primarily written for graduate students, postgraduate students, professionals and academic researchers working in the fields of Computer Science and Engineering, Information Technology and Electrical Engineering.
This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the bas...
As data is an important asset for any organization, it is essential to apply semantic technologies in data science to fulfill the need of any organization. This first volume of a two-volume handbook set provides a roadmap for new trends and future developments of data science with semantic technologies. Data Science with Semantic Technologies: New Trends and Future Developments highlights how data science enables the user to create intelligence through these technologies. In addition, this book offers the answers to various questions such as: Can semantic technologies facilitate data science? Which type of data science problems can be tackled by semantic technologies? How can data scientists...
This book presents the proceedings of the 4th International Conference of Reliable Information and Communication Technology 2019 (IRICT 2019), which was held in Pulai Springs Resort, Johor, Malaysia, on September 22–23, 2019. Featuring 109 papers, the book covers hot topics such as artificial intelligence and soft computing, data science and big data analytics, internet of things (IoT), intelligent communication systems, advances in information security, advances in information systems and software engineering.
Machine learning (ML) and deep learning (DL) algorithms are invaluable resources for Industry 4.0 and allied areas and are considered as the future of computing. A subfield called neural networks, to recognize and understand patterns in data, helps a machine carry out tasks in a manner similar to humans. The intelligent models developed using ML and DL are effectively designed and are fully investigated – bringing in practical applications in many fields such as health care, agriculture and security. These algorithms can only be successfully applied in the context of data computing and analysis. Today, ML and DL have created conditions for potential developments in detection and prediction...
The 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016) is being held at Boston University, Boston, USA on the 17-18th March 2016. The Conference Chair is Dr Tanya Zlateva and the Programme Chair is Professor Virginia Greiman, both from Boston University. ICCWS is a recognised Cyber Security event on the International research conferences calendar and provides a valuable platform for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyber Warfare and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experience...