| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910812037603321 |
|
|
Autore |
Ludders John W. |
|
|
Titolo |
Errors in veterinary anesthesia / / John W. Ludders, Matt McMillan |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Ames, Iowa ; ; Chichester, [England] ; ; Oxford, [England] : , : Wiley Blackwell, , 2017 |
|
©2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-25973-8 |
1-119-25972-X |
1-119-25974-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (257 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Veterinary anesthesia |
Medical errors |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Title Page; Table of Contents; Preface; Acknowledgments; Introduction; References; CHAPTER 1: Errors: Terminology and Background; Error: terminology; Conclusion; References; CHAPTER 2: Errors: Organizations, Individuals, and Unsafe Acts; Error causation: technical factors; Error causation: organizational and supervision factors; Error causation: environmental factors; Error causation: personnel factors; Error causation: human factors; Error causation: other factors; Conclusion; References; CHAPTER 3: Reporting and Analyzing Patient Safety Incidents; The limitation in only counting errors |
How can we learn the most from our errors?Analyzing patient safety incidents; Conclusion; References; CHAPTER 4: Equipment and Technical Errors in Veterinary Anesthesia; Cases; Near miss vignettes; Conclusion; References; CHAPTER 5: Medication Errors in Veterinary Anesthesia; Cases; Near miss vignettes; Conclusions; References; CHAPTER 6: Errors of Clinical Reasoning and Decision-making in Veterinary Anesthesia; Cases; Near miss vignettes; Conclusion; References; CHAPTER 7: Errors of Communication and Teamwork in Veterinary Anesthesia; Cases; Near miss vignette; Conclusion; References |
|
|
|
|
|
|
|
|
|
|
|
|
|
CHAPTER 8: Error Prevention in Veterinary AnesthesiaGeneral strategies for error prevention; Specific strategies for error prevention; Conclusion; References; APPENDIX A: Suggested Readings; APPENDIX B: Terminology; Primary terms; Secondary terms; APPENDIX C: ACVAA Monitoring Guidelines; Position Statement (updated 2009); APPENDIX D: ACVAA Guidelines for Anesthesia in Horses1; APPENDIX E: A Brief History of Checklists; APPENDIX F: FDA Anesthesia Apparatus Checkout1; APPENDIX G: Association of Veterinary Anaesthetists Anaesthetic Safety Checklist |
APPENDIX H: Critical clinical condition checklistsIndex; End User License Agreement |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910770274903321 |
|
|
Autore |
Pan Zhixin |
|
|
Titolo |
Explainable AI for Cybersecurity / / by Zhixin Pan, Prabhat Mishra |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (249 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Electronic circuits |
Data protection |
Electronic circuit design |
Embedded computer systems |
Artificial intelligence |
Computational Intelligence |
Electronic Circuits and Systems |
Data and Information Security |
Electronics Design and Verification |
Embedded Systems |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Part 1: Introduction -- Chapter 1. Cybersecurity Landscape for Computer Systems -- Chapter 2. Explainable Artificial Intelligence -- Part 2: Detection of Software Vulnerabilities -- Chapter 3. Malware Detection using Explainable AI -- Chapter 4. Spectre and Meltdown Detection using Explainable AI -- Part 3: Detection of Hardware Vulnerabilities -- Chapter 5. Hardware Trojan Detection using Reinforcement Learning -- Chapter 6. Hardware Trojan Detection using Side-Channel Analysis -- Chapter 7. Hardware Trojan Detection using Shapley Ensemble Boosting -- Part 4: Mitigation of AI Vulnerabilities -- Chapter 8. Mitigation of Adversarial Machine Learning -- Chapter 9. AI Trojan Attacks and Countermeasures -- Part 5: Acceleration of Explainable AI -- Chapter 10. Hardware Acceleration of Explainable AI -- Chapter 11. Explainable AI Acceleration using Tensor Processing Units -- Part 6: Conclusion -- Chapter 12. The Future of AI-Enabled Cybersecurity. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides a comprehensive overview of security vulnerabilities and state-of-the-art countermeasures using explainable artificial intelligence (AI). Specifically, it describes how explainable AI can be effectively used for detection and mitigation of hardware vulnerabilities (e.g., hardware Trojans) as well as software attacks (e.g., malware and ransomware). It provides insights into the security threats towards machine learning models and presents effective countermeasures. It also explores hardware acceleration of explainable AI algorithms. The reader will be able to comprehend a complete picture of cybersecurity challenges and how to detect them using explainable AI. This book serves as a single source of reference for students, researchers, engineers, and practitioners for designing secure and trustworthy systems. Introduces a wide variety of software and hardware vulnerabilities; Describes solutions for detecting security attacks using explainable AI; Presents a fast and robust framework using hardware acceleration and mitigation of adversarial attacks. |
|
|
|
|
|
|
|
| |