Computational intelligence for multimedia big data on the cloud with engineering applications / / edited by Arun Kumar Sangaiah, Michael Sheng, Zhiyong Zhang |
Edizione | [First edition.] |
Pubbl/distr/stampa | London, United Kingdom : , : Academic Press, an imprint of Elsevier, , [2018] |
Descrizione fisica | 1 online resource (364 pages) : illustrations |
Disciplina | 006.3 |
Collana | Intelligent Data Centric Systems |
Soggetto topico |
Computational intelligence
Cloud computing Big data |
ISBN |
0-12-813327-9
0-12-813314-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910583315803321 |
London, United Kingdom : , : Academic Press, an imprint of Elsevier, , [2018] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , [2019] |
Descrizione fisica | 1 online resource (365 pages) |
Disciplina | 006.3/1 |
Soggetto topico |
Computer networks - Security measures - Data processing
Computer security - Data processing Machine learning Artificial intelligence |
ISBN |
0-429-99572-5
0-429-50404-7 0-429-99571-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index |
Record Nr. | UNINA-9910793310903321 |
Boca Raton : , : CRC Press, , [2019] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning for computer and cyber security : principles, algorithms, and practices / / editors, Brij B. Gupta, Michael Sheng |
Pubbl/distr/stampa | Boca Raton : , : CRC Press, , [2019] |
Descrizione fisica | 1 online resource (365 pages) |
Disciplina | 006.3/1 |
Soggetto topico |
Computer networks - Security measures - Data processing
Computer security - Data processing Machine learning Artificial intelligence |
ISBN |
0-429-99572-5
0-429-50404-7 0-429-99571-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Foreword; Acknowledgement; Preface; Table of Contents; 1: A Deep Learning-based System for Network Cyber Threat Detection; 2: Machine Learning for Phishing Detection and Mitigation; 3: Next Generation Adaptable Opportunistic Sensing-based Wireless Sensor Networks: A Machine Learning Perspective; 4: A Bio-inspired Approach to Cyber Security; 5: Applications of a Model to Evaluate and Utilize Users' Interactions in Online Social Networks; 6: A Deep-dive on Machine Learning for Cyber Security Use Cases
7: A Prototype Method to Discover Malwares in Android-based Smartphones through System Calls8: Metaheuristic Algorithms-based Feature Selection Approach for Intrusion Detection; 9: A Taxonomy of Bitcoin Security Issues and Defense Mechanisms; 10: Early Detection and Prediction of Lung Cancer using Machine-learning Algorithms Applied on a Secure Healthcare Data-system Architecture; 11: Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection 12: Detecting Controller Interlock-based Tax Evasion Groups in a Corporate Governance Network13: Defending Web Applications against JavaScript Worms on Core Network of Cloud Platforms; 14: Importance of Providing Incentives and Economic Solutions in IT Security; 15: Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-efficacy into a Game Application; Index |
Record Nr. | UNINA-9910799931803321 |
Boca Raton : , : CRC Press, , [2019] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing the web of things : linking the real world to the web / / edited by Quan Z. Sheng [and three others] |
Autore | Sheng Michael |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cambridge, Massachusetts : , : Morgan Kaufmann Publishers, , 2017 |
Descrizione fisica | 1 online resource (484 pages) : illustrations |
Disciplina | 004.6780151932 |
Soggetto topico |
Internet of things
Artificial intelligence |
ISBN | 0-12-809765-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Modeling and searching. Ontologies and context modeling for the web of things; The anatomy of an intent based search and crawler engine for the web of things ; Modeling RESTful web of things services ; A semantic-rich approach to IoT the generalized world entities paradigm – Part 2. System building and practices. Building a web of things with avatars ; A WoT testbed for research and course projects ; Using reference architecture for design and evaluation of Web of Things systems ; Efficient and secure pull requests for emergency cases using a mobile access framework – Part 3. Data integration and analytics. Automatic integration and querying of semantic rich heterogeneous data ; Building entity graphs for the web of things management ; Building interoperable and cross-domain semantic web of things applications ; Web of things data storage – Part 4. Applications, security and social impact. WoX: model-driven development of web of things applications ; Security issues of the web of things ; A web of fitness “things”: an exploration of social impacts & vulnerable populations. |
Record Nr. | UNINA-9910583472403321 |
Sheng Michael
![]() |
||
Cambridge, Massachusetts : , : Morgan Kaufmann Publishers, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Web services foundations / / Athman Bouguettaya, Quan Z. Sheng, Florian Daniel, editors ; foreword by Michael P. Papazoglou |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York : , : Springer, , 2014 |
Descrizione fisica | 1 online resource (xix, 739 pages) : illustrations (some color) |
Disciplina |
004
004.6 004.678 005.7 |
Collana | Gale eBooks |
Soggetto topico |
Web services
Service-oriented architecture (Computer science) Cloud computing |
ISBN | 1-4614-7518-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Services and Business Processes: A Round Trip -- RESTful Web Services: Principles, Patterns, Emerging Technologies -- Conceptual Design of Sound, Custom Composition Languages -- Service-Oriented Programming with Jolie -- From Artifacts to Activities -- On the Composability of Semantic Web Service -- Semantic Web Service Composition: the Web Service Challenge Perspective -- Automated Service Composition Based on Behaviors: The Roman Model -- Behavioral Service Substitution -- Web Service Adaptation: Mismatch Patterns and Semi-Automated Approach to Mismatch Identification and Adapter Development -- Transformation Framework for Consistent Evolution of UML -- Behavioral Elements into BPMN Design Element -- Context-Aware Services Engineering for Service-Oriented Architectures -- Service Selection in Web Service Composition: A Comparative Review of Existing Approaches -- QoS Analysis in Service Oriented Computing -- QoS-based Service Selection -- Composition of Web Services: from Qualitative to Quantitative Timed Properties -- Adaptive Composition and QoS Optimization of Conversational Services through Graph Planning Encoding -- Automated Negotiation Among Web services -- DRAAS: Dynamically Reconfigurable Architecture for Autonomic Services -- Comprehensive Variability Modeling and Management for Customizable Process-Based Service Compositions -- Software Product Line Engineering to Develop Variant-rich Web Services -- QoS-aware Web Service Recommendation via Collaborative Filtering -- On Bootstrapping Web Service Recommendation -- An Approach for Service Discovery and Recommendation using Contexts -- Data Transformation Knowledge Reuse in Spreadsheet-based Mashup Development Platform -- A Unified RGPS-Based Approach Supporting Service-Oriented Process Customization -- Assisted Mashup Development: On the Discovery and Recommendation of Mashup Composition Knowledge -- End Users Developing Mashups. |
Record Nr. | UNINA-9910299045203321 |
New York : , : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|