LEADER 03988nam 22006375 450 001 9910890189203321 005 20250807145417.0 010 $a9789819737451 010 $a9819737451 024 7 $a10.1007/978-981-97-3745-1 035 $a(MiAaPQ)EBC31692519 035 $a(Au-PeEL)EBL31692519 035 $a(CKB)36231087800041 035 $a(Exl-AI)31692519 035 $a(DE-He213)978-981-97-3745-1 035 $a(EXLCZ)9936231087800041 100 $a20240928d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Trends in Expert Applications and Security $eProceedings of ICE-TEAS 2024, Volume 1 /$fedited by Vijay Singh Rathore, João Manuel R. S. Tavares, Eva Tuba, Vladan Devedzic 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (421 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1030 311 08$a9789819737444 311 08$a9819737443 327 $aPreface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN$7Generated by AI. 330 $aThe book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2024 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during March 15?17, 2024. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1030 606 $aComputational intelligence 606 $aData protection 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aData and Information Security 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aData protection. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aData and Information Security. 615 24$aArtificial Intelligence. 676 $a005.8 700 $aRathore$b Vijay Singh$01733795 701 $aManuel R. S. Tavares$b João$01771748 701 $aTuba$b Eva$01769412 701 $aDevedzic$b Vladan$01373189 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910890189203321 996 $aEmerging Trends in Expert Applications and Security$94264225 997 $aUNINA