Advances in Model and Data Engineering in the Digitalization Era : MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2–4, 2023, Proceedings / / edited by Mohamed Mosbah, Tahar Kechadi, Ladjel Bellatreche, Faiez Gargouri, Chirine Ghedira Guegan, Hassan Badir, Amin Beheshti, Mohamed Mohsen Gammoudi |
Autore | Mosbah Mohamed |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (255 pages) |
Disciplina | 005.1 |
Altri autori (Persone) |
KechadiTahar
BellatrecheLadjel GargouriFaiez GueganChirine Ghedira BadirHassan BeheshtiAmin GammoudiMohamed Mohsen |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Software engineering
Application software Artificial intelligence Computer engineering Computer networks Operating systems (Computers) Data structures (Computer science) Information theory Software Engineering Computer and Information Systems Applications Artificial Intelligence Computer Engineering and Networks Operating Systems Data Structures and Information Theory |
ISBN | 3-031-55729-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Machine Learning and Optimization -- Scoring Unstructured Data from Online Social Network for Homeland Security Applications -- A Comparative Analysis of Time Series Transformers and Alternative Deep Learning Models for SSVEP Classification -- MixUp Data Augmentation for Handwritten Arabic Mathematical Symbols Recognition -- Natural Language Processing -- Towards an Open Domain Arabic Question Answering System: Assessment of the Bert Approach -- Multi-lingual scene text detection containing the Arabic scripts using an optimal then enhanced YOLO model -- Transfer Learning Model for Cyberbullying Detection in Tunisian Social Networks -- Modeling and Data Management -- Node2Vec stability: preliminary study to ensure the compatibility of embeddings with incremental data alignment -- Towards Enabling Domain-Specific Modeling Language Exchange between Modeling Tools -- Healthcare Applications -- The Power of Prognosis: Cox Model Prediction of Disease-Free Survival in Colon Cancer -- Transfer Learning in Segmenting Myocardium Perfusion Images -- Smart Saliency Detection For Prosthetic Vision -- Automatic Detection of Multiple Sclerosis Using Genomic Expression -- DEITS Worshop: Data Engineering in IoT Systems -- Distributed and Collaborative Learning Approach for Stroke Prediction -- IoT Technologies for Smart Healthcare Buildings with Distributed Deep Learning Techniques -- How Does Blockchain Enhance Zero Trust Security in IoMT -- HIPAA and GDPR compliance in IoT healthcare systems -- A Secure IoT Architecture for Industry 4.0 -- From functional requirements to NoSQL database models: application to IoT Geospatial Data -- A survey on intrusion detection systems for IoT networks based on long short-term memory. |
Record Nr. | UNINA-9910845481503321 |
Mosbah Mohamed | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Foundations and Practice of Security : 16th International Symposium, FPS 2023, Bordeaux, France, December 11–13, 2023, Revised Selected Papers, Part I / / edited by Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro |
Autore | Mosbah Mohamed |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (468 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
SèdesFlorence
TawbiNadia AhmedToufik Boulahia-CuppensNora Garcia-AlfaroJoaquin |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Computer engineering Computer networks Data and Information Security Computer Engineering and Networks Computer Communication Networks |
ISBN | 3-031-57537-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AI and Cybersecurity -- An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection -- Securing Smart Vehicles through Federated Learning -- Using Reed-Muller Codes for Classification with Rejection and Recovery -- Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection -- Security Analysis -- Practices for Assessing the Security Level of Solidity Smart Contracts -- Effectiveness of Binary-Level CFI Techniques -- A Small World–Privacy Preserving IoT Device-type Fingerprinting with Small Datasets -- URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber -- Phishing and Social Network -- Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior? -- IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets -- Web Scams Detection System -- Vulnerabilities and Exploits -- VulMAE: Graph Masked Autoencoders for VulnerabilityDetection from Source and Binary Codes -- Analysis of Cryptographic CVEs: Lessons Learned and Perspectives -- A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports -- Enhancing Code Security Through Open-source Large Language Models: A Comparative Study -- Network and System Threat -- Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations -- Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware -- Automated Attacker Behaviour Classification Using Threat Intelligence Insights -- UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls -- Malware Analysis -- Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code -- On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr -- Original Entry Pointdetection based on graph similarity -- Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure -- Security Design -- Hardening Systems Against Data Corruption Attacks at Design Time -- Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols -- A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm -- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response. |
Record Nr. | UNINA-9910855382203321 |
Mosbah Mohamed | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|