1.

Record Nr.

UNISOBSOBE00055150

Autore

Achbar, Mark

Titolo

The corporation / un film di Mark Achbar, Jennifer Abbott & Joel Bakan

Pubbl/distr/stampa

Milano : Fandango doc : Feltrinelli Real Cinema, 2003

Descrizione fisica

1 DVD (145 min.) : sonoro (Dolby digital SR 2.0) ; 12 cm

Collana

Feltrinelli Real Cinema

Altri autori (Persone)

Abbott, Jennifer

Bakan, Joel

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Tit. del contenitore

Ripr. del film documentario del 2003, Canada

Lingue: italiano, inglese



2.

Record Nr.

UNINA9910890189203321

Autore

Rathore Vijay Singh

Titolo

Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 1 / / edited by Vijay Singh Rathore, João Manuel R. S. Tavares, Eva Tuba, Vladan Devedzic

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024

ISBN

9789819737451

9819737451

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (421 pages)

Collana

Lecture Notes in Networks and Systems, , 2367-3389 ; ; 1030

Altri autori (Persone)

Manuel R. S. TavaresJoão

TubaEva

DevedzicVladan

Disciplina

005.8

Soggetti

Computational intelligence

Data protection

Artificial intelligence

Computational Intelligence

Data and Information Security

Artificial Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors --  Applications and Challenges of Machine Learning (ML) in Cyber Security --   1 Introduction --   2 Application of ML in Cybersecurity --     2.1 Cyberthreat Identification and Security --     2.2 AI-Based Software for Virus Detection --     2.3 Behavior Modeling --     2.4 Fighting AI-Based Threats --     2.5 Network Intrusion Detection --     2.6 Monitoring of Emails --     2.7 Malware Detection and Classification --     2.8 Watering Hole --     2.9 Remote Exploitation --   3 Challenges --   4 Conclusion --   References --  Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage --   1 Introduction --     1.1 Characteristics of Embedded Systems --     1.2 Application Specific Systems --     1.3 Reactive Systems --   2 Related Works --     2.1 Public M-Health Service Realization in the License-Free Spectrum --    



2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS --     2.3 How Well a Multi-Tier Wireless Network Monitors Health Care --     2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN

Sommario/riassunto

The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2024 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during March 15–17, 2024. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.