Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
| Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Stevenage : , : Institution of Engineering & Technology, , 2023 |
| Descrizione fisica | 1 online resource (368 pages) |
| Disciplina | 006.248 |
| Altri autori (Persone) |
HammadMohamed
MalehYassine GuptaBrij B. <1982-> MazurczykWojciech |
| Collana | Security Series |
| Soggetto topico |
Biometric identification - Technological innovations
Computer security - Technological innovations Artificial intelligence - Industrial applications Artificial intelligence Identification biométrique - Innovations Sécurité informatique - Innovations Intelligence artificielle Intelligence artificielle - Applications industrielles artificial intelligence |
| ISBN |
1-83724-442-1
1-5231-6296-1 1-83953-548-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index |
| Record Nr. | UNINA-9911007280803321 |
Abd El-Latif Ahmed A
|
||
| Stevenage : , : Institution of Engineering & Technology, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
| Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (259 pages) |
| Disciplina | 621.382 |
| Altri autori (Persone) |
TawalbehLo'ai
MalehYassine GuptaBrij B. <1982-> |
| Collana | EAI/Springer Innovations in Communication and Computing |
| Soggetto topico |
Telecommunication
Data protection Security systems Database management Communications Engineering, Networks Data and Information Security Security Science and Technology Database Management System |
| ISBN |
9783031510977
3031510976 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part 1: AI Enabled Smart City IoT System using Edge /Fog Computing -- Chapter 1. Multi-level edge computing system for autonomous vehicles -- Chapter 2. UAVs based edge computing system for smart city applications -- Chapter 3. Organization of Smart City Services Based on Microservice Architecture -- Chapter 4. Pseudo-Random Error-Correcting Codes in Network Coding -- Chapter 5. Proactive management in Smart City: transport convoys -- Chapter 6. Federated Learning for Linux Malware Detection: An Experimental Study -- Chapter 7. Delay prediction in M2M networks using Deep Learning approach -- Chapter 8. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning -- Chapter 9. Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning -- Chapter 10. Service migration algorithm for UAVs recharge zones in future 6G network -- Chapter 11. FedBA: Non-IID Federated Learning Framework in UAV Networks -- Part 2: Fog/Edge Computing Security Issues -- Chapter 12. Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) -- Chapter 13. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey -- Chapter 14. Machine Learning Techniques for Secure Edge SDN -- Chapter 15. Machine Learning-Based Identity and Access Management for Cloud Security -- Chapter 16. Spatial Data of Smart Cities: Trust -- Chapter 17. Smart City Infrastructure Projects: Spatial Data of Risks -- Chapter 18. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks -- Chapter 19. Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security. |
| Record Nr. | UNINA-9910845481903321 |
Abd El-Latif Ahmed A
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
| Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions |
| Autore | Abd El-Latif Ahmed A |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2021 |
| Descrizione fisica | 1 online resource (283 pages) |
| Altri autori (Persone) |
Abd-El-AttyBassem
Venegas-AndracaSalvador E MazurczykWojciech GuptaBrij B |
| Collana | Studies in Big Data Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 3-030-85428-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910502978403321 |
Abd El-Latif Ahmed A
|
||
| Cham : , : Springer International Publishing AG, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||