1.

Record Nr.

UNINA9910708157403321

Titolo

The Federal radionavigation plan; H.R. 1684, The Foreign Spill Protection Act of 2015; and H.R. ____, The National Icebreaker Fund Act of 2015 : hearing before the Subcommittee on Coast Guard and Maritime Transportation of the Committee on Transportation and Infrastructure, House of Representatives, One Hundred Fourteenth Congress, first session, July 28, 2015

Pubbl/distr/stampa

Washington : , : U.S. Government Publishing Office, , 2015

Descrizione fisica

1 online resource (xxii, 61 pages)

Soggetti

Global Positioning System

Aids to navigation - United States

Icebreakers (Ships) - United States

Liability for oil pollution damages - United States

Aids to navigation

Icebreakers (Ships)

Liability for oil pollution damages

Operational readiness (Military science)

Legislative hearings.

United States

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed Nov. 3, 2015).

"114-26."

Print version is available for sale by the Superintendent of Documents, U.S. Government Printing Office.

Nota di bibliografia

Includes bibliographical references.



2.

Record Nr.

UNINA9910843799703321

Autore

Mahajan Shilpa

Titolo

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Pubbl/distr/stampa

Newark : , : John Wiley & Sons, Incorporated, , 2024

©2024

ISBN

1-394-19647-4

1-394-19645-8

Edizione

[1st ed.]

Descrizione fisica

1 online resource (371 pages)

Altri autori (Persone)

KhuranaMehak

EstrelaVania Vieira

Disciplina

006.3

Soggetti

Computer security - Technological innovations

Artificial intelligence

Computer networks - Security measures

Computer crimes - Prevention

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies -- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network -- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains.



Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era.

Sommario/riassunto

"Today, it's impossible to deploy effective cybersecurity technology without relying heavily on machine learning. With machine learning, cybersecurity systems can be analyzed using patterns and learn from them to help prevent similar attacks and respond to changing behavior. It can help cybersecurity teams to be more proactive in preventing threats and responding to active attacks in real time. In short, machine learning can make cybersecurity simpler, more proactive, less expensive, and far more effective. AI cybersecurity, with the support of machine learning, is set to be a powerful tool in the looming future. As with other industries, human interaction has long been essential and irreplaceable in security. While cybersecurity currently relies heavily on human input, we are gradually seeing technology become better at specific tasks than we are"--