top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
Autore Abd El-Latif Ahmed A
Edizione [1st ed.]
Pubbl/distr/stampa Stevenage : , : Institution of Engineering & Technology, , 2023
Descrizione fisica 1 online resource (368 pages)
Disciplina 006.248
Altri autori (Persone) HammadMohamed
MalehYassine
GuptaBrij B. <1982->
MazurczykWojciech
Collana Security Series
Soggetto topico Biometric identification - Technological innovations
Computer security - Technological innovations
Artificial intelligence - Industrial applications
Artificial intelligence
Identification biométrique - Innovations
Sécurité informatique - Innovations
Intelligence artificielle
Intelligence artificielle - Applications industrielles
artificial intelligence
ISBN 1-83724-442-1
1-5231-6296-1
1-83953-548-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index
Record Nr. UNINA-9911007280803321
Abd El-Latif Ahmed A  
Stevenage : , : Institution of Engineering & Technology, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Handbook of Computer Networks and Cyber Security : Principles and Paradigms / / edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xx, 959 pages) : illustrations
Disciplina 004.6
Soggetto topico Data protection
Computer networks
Computers
Artificial intelligence
Security
Computer Communication Networks
Information Systems and Communication Service
Artificial Intelligence
ISBN 9783030222772
3030222772
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
Record Nr. UNINA-9910366655603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities : Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) / / edited by Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta
Autore Abd El-Latif Ahmed A
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (259 pages)
Disciplina 621.382
Altri autori (Persone) TawalbehLo'ai
MalehYassine
GuptaBrij B. <1982->
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico Telecommunication
Data protection
Security systems
Database management
Communications Engineering, Networks
Data and Information Security
Security Science and Technology
Database Management System
ISBN 9783031510977
3031510976
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: AI Enabled Smart City IoT System using Edge /Fog Computing -- Chapter 1. Multi-level edge computing system for autonomous vehicles -- Chapter 2. UAVs based edge computing system for smart city applications -- Chapter 3. Organization of Smart City Services Based on Microservice Architecture -- Chapter 4. Pseudo-Random Error-Correcting Codes in Network Coding -- Chapter 5. Proactive management in Smart City: transport convoys -- Chapter 6. Federated Learning for Linux Malware Detection: An Experimental Study -- Chapter 7. Delay prediction in M2M networks using Deep Learning approach -- Chapter 8. Energy-Efficient Beam Shaping in MIMO System Using Machine Learning -- Chapter 9. Channel Cluster Configuration Selection Method for IEEE 802.11 Networks Planning -- Chapter 10. Service migration algorithm for UAVs recharge zones in future 6G network -- Chapter 11. FedBA: Non-IID Federated Learning Framework in UAV Networks -- Part 2: Fog/Edge Computing Security Issues -- Chapter 12. Big Data Analytics for Secure Edge-based Manufacturing Internet of Things (MIoT) -- Chapter 13. Artificial Intelligence-Based Secure Edge Computing Systems for IoTDs and Smart Cities: A Survey -- Chapter 14. Machine Learning Techniques for Secure Edge SDN -- Chapter 15. Machine Learning-Based Identity and Access Management for Cloud Security -- Chapter 16. Spatial Data of Smart Cities: Trust -- Chapter 17. Smart City Infrastructure Projects: Spatial Data of Risks -- Chapter 18. A Comparative Analysis of Blockchain-Based Authentication Models for IoT Networks -- Chapter 19. Development of determining a wireless client location method in the IEEE 802.11 network in order to ensure the IT infrastructure security.
Record Nr. UNINA-9910845481903321
Abd El-Latif Ahmed A  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui