00977cam0-2200313---450 99000833458040332120210525183350.0000833458FED01000833458(Aleph)000833458FED0100083345820060524d1880----km-y0itay50------baitaITy---a---001yyStudi sul Decameronedi Licurgo CappellettiParmaBattei1880XXII, 442 p.21 cmBoccaccio, GiovanniDecameron853.1Cappelletti,Licurgo55432ITUNINA20060524RICAUNIMARCVisualizza la versione elettronica in Österreichische Nationalbibliothekhttp://digital.onb.ac.at/OnbViewer/viewer.faces?doc=ABO_%2BZ26258130520210524BK990008334580403321P.3 A1(1574)FLFBCFLFBCStudi sul Decamerone721538UNINA03988nam 22006375 450 991089018920332120250807145417.09789819737451981973745110.1007/978-981-97-3745-1(MiAaPQ)EBC31692519(Au-PeEL)EBL31692519(CKB)36231087800041(Exl-AI)31692519(DE-He213)978-981-97-3745-1(EXLCZ)993623108780004120240928d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierEmerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 1 /edited by Vijay Singh Rathore, João Manuel R. S. Tavares, Eva Tuba, Vladan Devedzic1st ed. 2024.Singapore :Springer Nature Singapore :Imprint: Springer,2024.1 online resource (421 pages)Lecture Notes in Networks and Systems,2367-3389 ;10309789819737444 9819737443 Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORNGenerated by AI.The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2024 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during March 15–17, 2024. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.Lecture Notes in Networks and Systems,2367-3389 ;1030Computational intelligenceData protectionArtificial intelligenceComputational IntelligenceData and Information SecurityArtificial IntelligenceComputational intelligence.Data protection.Artificial intelligence.Computational Intelligence.Data and Information Security.Artificial Intelligence.005.8Rathore Vijay Singh1733795Manuel R. S. Tavares João1771748Tuba Eva1769412Devedzic Vladan1373189MiAaPQMiAaPQMiAaPQBOOK9910890189203321Emerging Trends in Expert Applications and Security4264225UNINA