The 3rd IEEE International Conference on Advanced Learning Technologies, 9-11 July 2003, Athens, Greece : proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2003 |
Disciplina | 607.8/5 |
Soggetto topico |
Technology - Study and teaching
Computer-assisted instruction Educational technology Technology - General Engineering & Applied Sciences |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996210745503316 |
[Place of publication not identified], : IEEE Computer Society, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The 3rd IEEE International Conference on Advanced Learning Technologies, 9-11 July 2003, Athens, Greece : proceedings |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2003 |
Disciplina | 607.8/5 |
Soggetto topico |
Technology - Study and teaching
Computer-assisted instruction Educational technology Technology - General Engineering & Applied Sciences |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910872548503321 |
[Place of publication not identified], : IEEE Computer Society, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 1 |
Autore | Rathore Vijay Singh |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (421 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
Manuel R. S. TavaresJoão
TubaEva DevedzicVladan |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico |
Expert systems (Computer science)
Computer security |
ISBN |
9789819737451
9819737451 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN |
Record Nr. | UNINA-9910890189203321 |
Rathore Vijay Singh | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|