01809nam 2200397 n 450 99638930360331620221108085615.0(CKB)1000000000646720(EEBO)2264214196(UnM)9958701700971(EXLCZ)99100000000064672019960315d1689 uh engurbn||||a|bb|By the King and Queen, a proclamation[electronic resource] William R. Whereas the Lords spiritual and temporal, and Commons in Parliament assembled, having received information that divers officers and soldiers are now in actual rebellion, ..London printed by Charles Bill and Thomas Newcomb, printers to the King and Queen's most Excellent Majesties1688 [i.e. 1689]1 sheet ([1] p.)"Given at our court at Whitehall this 16th day of March, in the first year of our reign".Orders the suppression of rebellious soldiers.Title from caption title and first lines of text.Imprint year given according to Lady Day dating.Steele notation: Commons have hereafter.Reproduction of original in the British Library.eebo-0018Great BritainHistoryRevolution of 1688Early works to 1800Great BritainHistoryWilliam and Mary, 1689-1702Early works to 1800Great BritainPolitics and government1689-1702Early works to 1800WilliamKing of England,1650-1702.1000870MaryQueen of England,1662-1694.1001117Uk-ESUk-ESCu-RivESBOOK996389303603316By the King and Queen, a proclamation2301263UNISA03657nam 22006255 450 991088781170332120250807143258.09789819739738981973973X10.1007/978-981-97-3973-8(MiAaPQ)EBC31681655(Au-PeEL)EBL31681655(CKB)35980432000041(Exl-AI)31681655(DE-He213)978-981-97-3973-8(EXLCZ)993598043200004120240918d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAI Applications in Cyber Security and Communication Networks Proceedings of Ninth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2023) /edited by Chaminda Hewage, Liqaa Nawaf, Nishtha Kesswani1st ed. 2024.Singapore :Springer Nature Singapore :Imprint: Springer,2024.1 online resource (546 pages)Lecture Notes in Networks and Systems,2367-3389 ;10329789819739721 9819739721 Preface -- Contents -- Editors and Contributors -- An RFP Dataset for Real, Fake, and Partially Fake Audio Detection -- 1 Introduction -- 2 The RFP Dataset -- 2.1 Real Audio Collection -- 2.2 Text-to-Speech Audio Generation -- 2.3 Voice Conversion (VC) Audio Generation -- 2.4 Audio with Noise Generation -- 2.5 Partial Fake (PF) Audio Generation -- 3 Dataset Composition -- 3.1 RFP Original Version -- 3.2 RFP Normalised Version -- 4 Experiments -- 4.1 ASVspoof 2021 Baseline -- 4.2 TSSDNet -- 4.3 RawGAT-ST -- 4.4 AASIST -- 5 Experiments Result -- 6 Conclusions and Future Developments -- References -- Evaluating Data Distribution Strategies in Federated Learning: A Trade-Off Analysis Between Privacy and Performance for IoT Security -- 1 Introduction -- 2 Related Works -- 3 IoT Device Security Using Federated Learning -- 3.1 Edge-IIoTset -- 3.2 CICIoT2023 -- 4 Experimentation and Results -- 4.1 Centralised Machine LearningGenerated by AI.This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11–12 December 2023. This book presents recent innovations in the field of cyber-security and privacy in communication networks in addition to cutting edge research in the field of next-generation communication networks.Lecture Notes in Networks and Systems,2367-3389 ;1032Computational intelligenceArtificial intelligenceData protectionComputational IntelligenceArtificial IntelligenceData and Information SecurityComputational intelligence.Artificial intelligence.Data protection.Computational Intelligence.Artificial Intelligence.Data and Information Security.005.8Hewage Chaminda1373670Nawaf Liqaa1770974Kesswani Nishtha1358149MiAaPQMiAaPQMiAaPQBOOK9910887811703321AI Applications in Cyber Security and Communication Networks4254735UNINA