top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2–4, 2023, Proceedings / / edited by Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, Faiez Gargouri, Chirine Ghedira Guegan, Hassan Badir, Amin Beheshti, Mohamed Mohsen Gammoudi
Advances in Model and Data Engineering in the Digitalization Era : MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2–4, 2023, Proceedings / / edited by Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, Faiez Gargouri, Chirine Ghedira Guegan, Hassan Badir, Amin Beheshti, Mohamed Mohsen Gammoudi
Autore Mosbah Mohamed
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (255 pages)
Disciplina 005.1
Altri autori (Persone) KechadiTahar
BellatrecheLadjel
GargouriFaiez
GueganChirine Ghedira
BadirHassan
BeheshtiAmin
GammoudiMohamed Mohsen
Collana Communications in Computer and Information Science
Soggetto topico Software engineering
Application software
Artificial intelligence
Computer engineering
Computer networks
Operating systems (Computers)
Data structures (Computer science)
Information theory
Software Engineering
Computer and Information Systems Applications
Artificial Intelligence
Computer Engineering and Networks
Operating Systems
Data Structures and Information Theory
ISBN 3-031-55729-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning and Optimization -- Scoring Unstructured Data from Online Social Network for Homeland Security Applications -- A Comparative Analysis of Time Series Transformers and Alternative Deep Learning Models for SSVEP Classification -- MixUp Data Augmentation for Handwritten Arabic Mathematical Symbols Recognition -- Natural Language Processing -- Towards an Open Domain Arabic Question Answering System: Assessment of the Bert Approach -- Multi-lingual scene text detection containing the Arabic scripts using an optimal then enhanced YOLO model -- Transfer Learning Model for Cyberbullying Detection in Tunisian Social Networks -- Modeling and Data Management -- Node2Vec stability: preliminary study to ensure the compatibility of embeddings with incremental data alignment -- Towards Enabling Domain-Specific Modeling Language Exchange between Modeling Tools -- Healthcare Applications -- The Power of Prognosis: Cox Model Prediction of Disease-Free Survival in Colon Cancer -- Transfer Learning in Segmenting Myocardium Perfusion Images -- Smart Saliency Detection For Prosthetic Vision -- Automatic Detection of Multiple Sclerosis Using Genomic Expression -- DEITS Worshop: Data Engineering in IoT Systems -- Distributed and Collaborative Learning Approach for Stroke Prediction -- IoT Technologies for Smart Healthcare Buildings with Distributed Deep Learning Techniques -- How Does Blockchain Enhance Zero Trust Security in IoMT -- HIPAA and GDPR compliance in IoT healthcare systems -- A Secure IoT Architecture for Industry 4.0 -- From functional requirements to NoSQL database models: application to IoT Geospatial Data -- A survey on intrusion detection systems for IoT networks based on long short-term memory.
Record Nr. UNINA-9910845481503321
Mosbah Mohamed  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I / / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro
Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I / / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro
Autore Mosbah Mohamed
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (468 pages)
Disciplina 005.8
Altri autori (Persone) SèdesFlorence
TawbiNadia
AhmedToufik
Boulahia-CuppensNora
Garcia-AlfaroJoaquin
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
ISBN 3-031-57537-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World–Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.
Record Nr. UNINA-9910855382203321
Mosbah Mohamed  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui