top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (100 pages)
Disciplina 353.00825
Soggetto topico Emergency management - Technological innovations
Computer security - Technological innovations
National security - Technological innovations
ISBN 1-5090-0770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910332525303321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Descrizione fisica 1 online resource (100 pages)
Disciplina 353.00825
Soggetto topico Emergency management - Technological innovations
Computer security - Technological innovations
National security - Technological innovations
ISBN 1-5090-0770-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996575435703316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Autore Mahajan Shilpa
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2024
Descrizione fisica 1 online resource (371 pages)
Disciplina 006.3
Altri autori (Persone) KhuranaMehak
EstrelaVania Vieira
Soggetto topico Computer security - Technological innovations
Artificial intelligence
Computer networks - Security measures
Computer crimes - Prevention
ISBN 1-394-19647-4
1-394-19645-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies -- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network -- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era.
Record Nr. UNINA-9910843799703321
Mahajan Shilpa  
Newark : , : John Wiley & Sons, Incorporated, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
Autore Abd El-Latif Ahmed A
Edizione [1st ed.]
Pubbl/distr/stampa Stevenage : , : Institution of Engineering & Technology, , 2023
Descrizione fisica 1 online resource (368 pages)
Disciplina 006.248
Altri autori (Persone) HammadMohamed
MalehYassine
GuptaBrij B. <1982->
MazurczykWojciech
Collana Security Series
Soggetto topico Biometric identification - Technological innovations
Computer security - Technological innovations
Artificial intelligence - Industrial applications
Artificial intelligence
Identification biométrique - Innovations
Sécurité informatique - Innovations
Intelligence artificielle
Intelligence artificielle - Applications industrielles
artificial intelligence
ISBN 1-83724-442-1
1-5231-6296-1
1-83953-548-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index
Record Nr. UNINA-9911007280803321
Abd El-Latif Ahmed A  
Stevenage : , : Institution of Engineering & Technology, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
Pubbl/distr/stampa New York : , : IEEE, , 2017
Descrizione fisica 1 online resource (210 pages)
Soggetto topico Law enforcement - Technological innovations
Emergency management - Technological innovations
Computer security - Technological innovations
ISBN 1-5090-6356-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910209342503321
New York : , : IEEE, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
Pubbl/distr/stampa New York : , : IEEE, , 2017
Descrizione fisica 1 online resource (210 pages)
Soggetto topico Law enforcement - Technological innovations
Emergency management - Technological innovations
Computer security - Technological innovations
ISBN 1-5090-6356-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280478803316
New York : , : IEEE, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The Kish cypher : the story of KLJN for unconditional security / / Laszlo B. Kish (Texas A&M University, USA)
The Kish cypher : the story of KLJN for unconditional security / / Laszlo B. Kish (Texas A&M University, USA)
Autore Kish Laszlo B.
Pubbl/distr/stampa [Hackensack] New Jersey : , : World Scientific, , [2017]
Descrizione fisica 1 online resource (460 pages) : illustrations (some color), color portraits
Disciplina 005.8
Soggetto topico Computer security - Technological innovations
Data encryption (Computer science)
Public key cryptography
Thermodynamic cycles
Electronic noise
Soggetto genere / forma Electronic books.
ISBN 981-4449-46-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910163090703321
Kish Laszlo B.  
[Hackensack] New Jersey : , : World Scientific, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Quantum Security : Revolutionizing Network Security with Digital IDs / / by Christopher Murphy
Quantum Security : Revolutionizing Network Security with Digital IDs / / by Christopher Murphy
Autore Murphy Christopher
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025
Descrizione fisica 1 online resource (103 pages)
Disciplina 005.8
Collana Apress Pocket Guides
Soggetto topico Computer security - Technological innovations
Quantum computing
ISBN 9798868812408
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. The Origins of Cybersecurity -- Chapter 2. The Devil is in the Details -- Chapter 3. The Science of Authentication -- Chapter 4. The Failure of Indirect Interaction -- Chapter 5. Digital IDs: The Solution That Was Ignored -- Chapter 6. Direct User Interaction: The Game Changer -- Chapter 7. Digital Superposition: A New Layer in Network Security -- Chapter 8. Rethinking Security: Insights from Einstein and Hawking -- Chapter 9. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 10. The Illusion of MFA Compliance -- Chapter 11. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 12. Digital ID: Transforming Key Industries -- Chapter 13. The Mitigations That No Longer Matter -- Chapter 14. The Battle for Integrity in Security -- Chapter 15. Big Data Vs. Network Security -- Chapter 16. The Future of Network Security -- Chapter 17. Implementing the Change -- Chapter 18. Digital ID as the New Endpoint -- Chapter 19. The Inescapable Conflict: Public vs. Private in Cybersecurity -- Chapter 20. The Unified Quantum Security Model: A New Approach to Cybersecurity -- Chapter 21. The Urgency of Action.
Record Nr. UNINA-9910983392803321
Murphy Christopher  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Theoretical cybersecurity : principles and advanced concepts / / Jacob G. Oakley [and four others]
Theoretical cybersecurity : principles and advanced concepts / / Jacob G. Oakley [and four others]
Autore Oakley Jacob G.
Pubbl/distr/stampa Berkeley, California : , : Apress, , [2022]
Descrizione fisica 1 online resource (224 pages)
Disciplina 005.8
Soggetto topico Computer security - Technological innovations
Computer security - Philosophy
Computer security - Forecasting
ISBN 1-4842-8300-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction Chapter 2. A Cyber Taxonomy Chapter 3. Cost Benefit Chapter 4. Roles and Responsibilities Chapter 5. Experimentation Chapter 6. Strategic Cybersecurity Chapter 7. Strategic Defensive Security Chapter 8. Infinite Cybersecurity Chapter 9. Cybersecurity and Game Theory Chapter 10. Game Theory Case Study: Ransomware
Record Nr. UNINA-9910584481203321
Oakley Jacob G.  
Berkeley, California : , : Apress, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui