Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
| Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Stevenage : , : Institution of Engineering & Technology, , 2023 |
| Descrizione fisica | 1 online resource (368 pages) |
| Disciplina | 006.248 |
| Altri autori (Persone) |
HammadMohamed
MalehYassine GuptaBrij B. <1982-> MazurczykWojciech |
| Collana | Security Series |
| Soggetto topico |
Biometric identification - Technological innovations
Computer security - Technological innovations Artificial intelligence - Industrial applications Artificial intelligence Identification biométrique - Innovations Sécurité informatique - Innovations Intelligence artificielle Intelligence artificielle - Applications industrielles artificial intelligence |
| ISBN |
1-83724-442-1
1-5231-6296-1 1-83953-548-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index |
| Record Nr. | UNINA-9911007280803321 |
Abd El-Latif Ahmed A
|
||
| Stevenage : , : Institution of Engineering & Technology, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Hiding and Its Applications : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi
| Data Hiding and Its Applications : Digital Watermarking and Steganography / / David Megías, Wojciech Mazurczyk, Minoru Kuribayashi |
| Autore | Megías David |
| Pubbl/distr/stampa | Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022 |
| Descrizione fisica | 1 online resource (234 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer security - Management |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Data Hiding and Its Applications |
| Record Nr. | UNINA-9910674393303321 |
Megías David
|
||
| Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
| Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
| Descrizione fisica | 1 online resource (325 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
MazurczykWojciech
WendzelSteffen ZanderSebastian HoumansadrAmir SzczypiorskiKrzysztof |
| Collana | IEEE Press Series on Information and Communication Networks Security |
| Soggetto topico | Computer networks - Security measures |
| ISBN |
1-119-08171-8
1-119-08183-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement |
| Record Nr. | UNINA-9910136810303321 |
| Hoboken, New Jersey : , : Wiley, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.]
| Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures / / Wojciech Mazurczyk...[et al.] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
| Descrizione fisica | 1 online resource (325 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
MazurczykWojciech
WendzelSteffen ZanderSebastian HoumansadrAmir SzczypiorskiKrzysztof |
| Collana | IEEE Press Series on Information and Communication Networks Security |
| Soggetto topico | Computer networks - Security measures |
| ISBN |
1-119-08171-8
1-119-08183-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement |
| Record Nr. | UNINA-9910819813003321 |
| Hoboken, New Jersey : , : Wiley, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
| Network and System Security [[electronic resource] ] : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XVIII, 762 p. 214 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Management information systems Computer science Software engineering Application software Systems and Data Security Computer Communication Networks Cryptology Management of Computing and Information Systems Software Engineering Information Systems Applications (incl. Internet) |
| ISBN | 3-319-64701-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . |
| Record Nr. | UNISA-996466456903316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Network and System Security : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
| Network and System Security : 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings / / edited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XVIII, 762 p. 214 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Computer networks Cryptography Data encryption (Computer science) Electronic data processing - Management Software engineering Application software Data and Information Security Computer Communication Networks Cryptology IT Operations Software Engineering Computer and Information Systems Applications |
| ISBN |
9783319647012
3319647016 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . |
| Record Nr. | UNINA-9910484446003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions
| Security and Privacy Preserving for IoT and 5G Networks : Techniques, Challenges, and New Directions |
| Autore | Abd El-Latif Ahmed A |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2021 |
| Descrizione fisica | 1 online resource (283 pages) |
| Altri autori (Persone) |
Abd-El-AttyBassem
Venegas-AndracaSalvador E MazurczykWojciech GuptaBrij B |
| Collana | Studies in Big Data Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 3-030-85428-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910502978403321 |
Abd El-Latif Ahmed A
|
||
| Cham : , : Springer International Publishing AG, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||