01997nam0 22003973i 450 VAN0026369620240806101512.991N978354039796020230926d1986 |0itac50 baengDE|||| |||||Categories of Boolean Sheaves of Simple AlgebrasYves DiersBerlinSpringer1986168 p.24 cm001VAN001022502001 Lecture notes in mathematics210 Berlin [etc.]Springer118706A15Galois correspondences, closure operators (in relation to ordered sets) [MSC 2020]VANC021559MF16W20Automorphisms and endomorphisms [MSC 2020]VANC022445MF18-XXCategory theory; homological algebra [MSC 2020]VANC019745MF18A32Factorization systems, substructures, quotient structures, congruences, amalgams [MSC 2020]VANC022272MF18C10Theories (e.g., algebraic theories), structure, and semantics [MSC 2020]VANC037151MF18DxxCategorical structures [MSC 2020]VANC024547MF18F20Presheaves and sheaves, stacks, descent conditions (category-theoretic aspects) [MSC 2020]VANC024449MFAlgebraKW:KSheavesKW:KBerlinVANL000066DiersYvesVANV21798854917Springer <editore>VANV108073650ITSOL20250314RICAhttps://doi.org/10.1007/BFb0075887E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN00263696BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08DLOAD e-book 6770 08eMF6770 20231002 Categories of Boolean sheaves of simple algebras78564UNICAMPANIA04705nam 22007095 450 991077026740332120251008143714.09783031426377303142637110.1007/978-3-031-42637-7(CKB)29353510400041(MiAaPQ)EBC31015642(Au-PeEL)EBL31015642(OCoLC)1414457637(DE-He213)978-3-031-42637-7(EXLCZ)992935351040004120231212d2023 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAI Embedded Assurance for Cyber Systems /edited by Cliff Wang, S.S. Iyengar, Kun Sun1st ed. 2023.Cham :Springer International Publishing :Imprint: Springer,2023.1 online resource (252 pages)9783031426360 Part. I. AI/ML for Digital Forensics -- Chapter. 1. Writer-dependent Off-line Signature Verification with Neural Networks -- Chapter. 2. Political Activism and Technology -- Chapter. 3. Forensic Proof and Criminal Liability for Development, Distribution and Use of Artificial Intelligence -- Part. II. AI/ML for CPS -- Chapter. 4. Automotive Batteries as Anomaly Detectors -- Chapter. 5. Zero Trust Architecture For Cyber-Physical Power System Security Based on Machine Learning -- Chapter. 6. AI-enabled Real-time Sensor Attack Detection for Cyber-physical Systems -- Part. III. AI/ML for Cyber Analysis -- Chapter. 7. Generating Vulnerable Code via Learning-Based Program Transformation -- Chapter. 8. Security and Privacy Problems in Self-Supervised Learning -- Chapter. 9. Federated Learning for IoT Applications, Attacks and Defense Methods -- Chapter. 10. AI Powered Correlation Technique to Detect VirtualMachine Attacks in Private Cloud Environment -- Chapter. 11. Detecting Fake Users in Online Social Networks -- Chapter. 12. Explaining Deep Learning based Security Applications -- Glossary -- Index.The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and reliability of digital systems using artificial intelligence (AI) technologies. As AI becomes more integrated into various aspects of our lives, the need for reliable and trustworthy AI systems becomes increasingly important. This book is an introduction to all of the above-mentioned areas in the context of AI Embedded Assurance for Cyber Systems. This book has three themes. First, the AI/ML for digital forensics theme focuses on developing AI and ML powered forensic tools, techniques, software, and hardware. Second, the AI/ML for cyber physical system theme describes that AI/ML plays an enabling role to boost the development of cyber physical systems (CPS), especially in strengthening the security and privacy ofCPS. Third, the AI/ML for cyber analysis theme focuses on using AI/ML to analyze tons of data in a timely manner and identify many complex threat patterns. This book is designed for undergraduates, graduate students in computer science and researchers in an interdisciplinary area of cyber forensics and AI embedded security applications. It is also useful for practitioners who would like to adopt AIs to solve cyber security problems.Computational intelligenceComputer networksSecurity measuresArtificial intelligenceComputer crimesCooperating objects (Computer systems)Computational IntelligenceMobile and Network SecurityArtificial IntelligenceComputer CrimeCybercrimeCyber-Physical SystemsComputational intelligence.Computer networksSecurity measures.Artificial intelligence.Computer crimes.Cooperating objects (Computer systems)Computational Intelligence.Mobile and Network Security.Artificial Intelligence.Computer Crime.Cybercrime.Cyber-Physical Systems.006.3Wang Cliff994400Iyengar S. S1069735Sun Kun1072499MiAaPQMiAaPQMiAaPQBOOK9910770267403321AI Embedded Assurance for Cyber Systems3660399UNINA