1.

Record Nr.

UNINA990003853230403321

Autore

Diebold, John <1926-2005>

Titolo

Beyond automation : managerial problems of an exploding technology / John Diebold

Pubbl/distr/stampa

New York : McGraw-Hill, 1964

Descrizione fisica

x, 220 p. : ill. ; 21 cm

Disciplina

301.243

Locazione

SES

Collocazione

G/1.02 DIE/64

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910798244803321

Titolo

Political sociology of India / / edited by Anand Kumar

Pubbl/distr/stampa

Los Angeles : , : SAGE, , 2013

ISBN

81-321-1842-1

81-321-1878-2

Descrizione fisica

1 online resource (xxxi, 413 pages) : illustrations

Collana

Readings in Indian sociology ; ; Volume 8

Disciplina

306.20954

Soggetti

Political sociology

Political culture - India

Social movements - India

India Politics and government

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.



3.

Record Nr.

UNINA9910568278803321

Titolo

Advances in Nature-Inspired Cyber Security and Resilience / / edited by Shishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022

ISBN

9783030907082

3030907082

Edizione

[1st ed. 2022.]

Descrizione fisica

1 online resource (194 pages)

Collana

EAI/Springer Innovations in Communication and Computing, , 2522-8609

Disciplina

006.3

005.8

Soggetti

Telecommunication

Computational intelligence

Artificial intelligence

Dynamics

Nonlinear theories

Data protection

Communications Engineering, Networks

Computational Intelligence

Artificial Intelligence

Applied Dynamical Systems

Data and Information Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Nature-inspired Cyber Security and Resilience: An Overview -- Detection of Reconnaissance Attacks on IoT Devices Using Deep Neural Networks -- Particle Swarm Optimization driven DSE based Low Cost Hardware Security for Securing DSP IP Cores -- Malicious Activity Detection in IoT Networks: A Nature-Inspired Approach -- Nature-inspired malware & anomaly detection in android-based systems -- A Review of Artificial Intelligence and Machine Learning Methods for Cybersecurity Applications -- A Nature Inspired DNA Encoding



Technique for Quantum Session Key Exchange Protocol -- Novel Hybridized Crow Optimization for Secure Data Transmission in Cyber Networks -- Malware attacks: Dimensions, Impact, and Defenses.

Sommario/riassunto

This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive examination of all facets of cyber security with a special focus on recent technologies and applications. The book showcases the advanced defensive cyber security mechanism that is a requirement in the industry and highlights measures that provide efficient and fast solutions. The authors explore the potential of AI-based and nature-inspired based computing compatibilities in establishing an adaptive defense mechanism system. The book focuses on current research while highlighting the empirical results along with theoretical concepts to provide a reference for students, researchers, scholars, professionals, and practitioners in the field of cyber security and analytics. This book features contributions from leading scholars from all over the world. Presents a comprehensive reference for innovative research in the field of cyber security and resilience with a nature-inspired focus; Presents research in artificial intelligence, machine learning, soft computing, and nature-inspired computing that can advance real-time cyber security applications; Relevant to industry professionals and researchers in cyber-security.