LEADER 03695nam 22005293 450 001 9910890189203321 005 20241001080241.0 010 $a9789819737451 010 $a9819737451 035 $a(MiAaPQ)EBC31692519 035 $a(Au-PeEL)EBL31692519 035 $a(CKB)36231087800041 035 $a(Exl-AI)31692519 035 $a(EXLCZ)9936231087800041 100 $a20241001d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Trends in Expert Applications and Security $eProceedings of ICE-TEAS 2024, Volume 1 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$d©2024. 215 $a1 online resource (421 pages) 225 1 $aLecture Notes in Networks and Systems Series ;$vv.1030 311 08$a9789819737444 311 08$a9819737443 327 $aPreface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN$7Generated by AI. 330 $aThis book is a compilation of proceedings from the 3rd International Conference on Emerging Trends in Expert Applications and Security (ICE-TEAS 2024) held in Jaipur, India. It focuses on recent technological advancements and security issues related to expert applications across various fields. The conference gathered researchers, academicians, and industry professionals to discuss and propose solutions to emerging challenges, particularly in the context of the COVID-19 pandemic. The book offers a platform for sharing knowledge and insights on the development and implementation of expert applications, highlighting both theoretical and practical perspectives. It serves as a resource for understanding the evolving landscape of technology and its impact on security and society.$7Generated by AI. 410 0$aLecture Notes in Networks and Systems Series 606 $aExpert systems (Computer science)$vCongresses$7Generated by AI 606 $aComputer security$vCongresses$7Generated by AI 615 0$aExpert systems (Computer science) 615 0$aComputer security 676 $a005.8 700 $aRathore$b Vijay Singh$01733795 701 $aManuel R. S. Tavares$b João$01771748 701 $aTuba$b Eva$01769412 701 $aDevedzic$b Vladan$01373189 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910890189203321 996 $aEmerging Trends in Expert Applications and Security$94264225 997 $aUNINA