Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
| Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Stevenage : , : Institution of Engineering & Technology, , 2023 |
| Descrizione fisica | 1 online resource (368 pages) |
| Disciplina | 006.248 |
| Altri autori (Persone) |
HammadMohamed
MalehYassine GuptaBrij B. <1982-> MazurczykWojciech |
| Collana | Security Series |
| Soggetto topico |
Biometric identification - Technological innovations
Computer security - Technological innovations Artificial intelligence - Industrial applications Artificial intelligence Identification biométrique - Innovations Sécurité informatique - Innovations Intelligence artificielle Intelligence artificielle - Applications industrielles artificial intelligence |
| ISBN |
1-83724-442-1
1-5231-6296-1 1-83953-548-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index |
| Record Nr. | UNINA-9911007280803321 |
Abd El-Latif Ahmed A
|
||
| Stevenage : , : Institution of Engineering & Technology, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
| Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (xx, 959 pages) : illustrations |
| Disciplina | 004.6 |
| Soggetto topico |
Data protection
Computer networks Computers Artificial intelligence Security Computer Communication Networks Information Systems and Communication Service Artificial Intelligence |
| ISBN |
9783030222772
3030222772 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory. |
| Record Nr. | UNINA-9910366655603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
| Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (259 pages) |
| Disciplina | 621.382 |
| Altri autori (Persone) |
TawalbehLo'ai
MalehYassine GuptaBrij B. <1982-> |
| Collana | EAI/Springer Innovations in Communication and Computing |
| Soggetto topico |
Telecommunication
Data protection Security systems Database management Communications Engineering, Networks Data and Information Security Security Science and Technology Database Management System |
| ISBN |
9783031510977
3031510976 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part 1: AI Enabled Smart City IoT System using Edge /Fog Computing -- Chapter 1. Multi-level edge computing system for autonomous vehicles -- Chapter 2. UAVs based edge computing system for smart city applications -- Chapter 3. Organization of Smart City Services Based on Microservice Architecture -- Chapter 4. Pseudo-Random Error-Correcting Codes in Network Coding -- Chapter 5. Proactive management in Smart City: transport convoys -- Chapter 6. Federated Learning for Linux Malware Detection: An Experimental Study -- Chapter 7. Delay prediction in M2M networks using Deep Learning approach -- Chapter 8. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning -- Chapter 9. Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning -- Chapter 10. Service migration algorithm for UAVs recharge zones in future 6G network -- Chapter 11. FedBA: Non-IID Federated Learning Framework in UAV Networks -- Part 2: Fog/Edge Computing Security Issues -- Chapter 12. Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) -- Chapter 13. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey -- Chapter 14. Machine Learning Techniques for Secure Edge SDN -- Chapter 15. Machine Learning-Based Identity and Access Management for Cloud Security -- Chapter 16. Spatial Data of Smart Cities: Trust -- Chapter 17. Smart City Infrastructure Projects: Spatial Data of Risks -- Chapter 18. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks -- Chapter 19. Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security. |
| Record Nr. | UNINA-9910845481903321 |
Abd El-Latif Ahmed A
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||