2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
| 2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
| Descrizione fisica | 1 online resource (100 pages) |
| Disciplina | 353.00825 |
| Soggetto topico |
Emergency management - Technological innovations
Computer security - Technological innovations National security - Technological innovations |
| ISBN | 1-5090-0770-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910332525303321 |
| Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security
| 2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security |
| Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
| Descrizione fisica | 1 online resource (100 pages) |
| Disciplina | 353.00825 |
| Soggetto topico |
Emergency management - Technological innovations
Computer security - Technological innovations National security - Technological innovations |
| ISBN | 1-5090-0770-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996575435703316 |
| Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
| Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection |
| Autore | Mahajan Shilpa |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2024 |
| Descrizione fisica | 1 online resource (371 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
KhuranaMehak
EstrelaVania Vieira |
| Soggetto topico |
Computer security - Technological innovations
Artificial intelligence Computer networks - Security measures Computer crimes - Prevention |
| ISBN |
1-394-19647-4
1-394-19645-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies -- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network -- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era. |
| Record Nr. | UNINA-9910843799703321 |
Mahajan Shilpa
|
||
| Newark : , : John Wiley & Sons, Incorporated, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications
| Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications |
| Autore | Abd El-Latif Ahmed A |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Stevenage : , : Institution of Engineering & Technology, , 2023 |
| Descrizione fisica | 1 online resource (368 pages) |
| Disciplina | 006.248 |
| Altri autori (Persone) |
HammadMohamed
MalehYassine GuptaBrij B. <1982-> MazurczykWojciech |
| Collana | Security Series |
| Soggetto topico |
Biometric identification - Technological innovations
Computer security - Technological innovations Artificial intelligence - Industrial applications Artificial intelligence Identification biométrique - Innovations Sécurité informatique - Innovations Intelligence artificielle Intelligence artificielle - Applications industrielles artificial intelligence |
| ISBN |
1-83724-442-1
1-5231-6296-1 1-83953-548-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Contents -- About the editors -- Preface -- 1. Introduction | Mohamed Hammad and Ahmed A. Abd El-Latif -- 2. AI in biometrics and cybersecurity | Mohamed Hammad and Ahmed A. Abd El-Latif -- 3. Biometric security performance: analysis methods and tools for evaluation and assessment | Mohamed Hammad and Ahmed A. Abd El-Latif -- 4. Leveraging generative adversarial networks and federated learning for enhanced cybersecurity: a concise review | Mohamed Hammad, Basma Abd El-Rahiem and Ahmed A. Abd El-Latif -- 5. A survey on face recognition methods with federated leaning | Huiting Sun, Jialiang Peng and Zhaogong Zhang -- 6. Artificial intelligence-based biometric authentication using ECG signal | Kiran Kumar Patro, Jaya Prakash Allam, Babji Prasad Chapa, P Lalitha Kumari and Mohamed Hammad -- 7. A comparative analysis of email phishing detection methods: a deep learning perspective | Cong Khoa Truong, Phuc Hao Do and Tran Duc Le -- 8. Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Aditya Anshul, Rahul Chaurasia and Anirban Sengupta -- 9. Intelligent authentication system using graphical one-time passwords | Adarsha Sigdel, Kheng Cher Yeo, Yassine Maleh and Mamoun Alazab -- 10. Role of AI in social cybersecurity: real-world case studies | Mudasir Ahmad Wani, Mohamed Hammad and Ahmed A. Abd El-Latif -- 11. Ethical and privacy concerns and challenges | Mohamed Hammad, Mudasir Ahmad Wani and Ahmed A. Abd El-Latif -- 12. Conclusion | Mohamed Hammad and Ahmed A. Abd El-Latif -- Index |
| Record Nr. | UNINA-9911007280803321 |
Abd El-Latif Ahmed A
|
||
| Stevenage : , : Institution of Engineering & Technology, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
| HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2017 |
| Descrizione fisica | 1 online resource (210 pages) |
| Soggetto topico |
Law enforcement - Technological innovations
Emergency management - Technological innovations Computer security - Technological innovations |
| ISBN | 1-5090-6356-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910209342503321 |
| New York : , : IEEE, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017
| HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2017 |
| Descrizione fisica | 1 online resource (210 pages) |
| Soggetto topico |
Law enforcement - Technological innovations
Emergency management - Technological innovations Computer security - Technological innovations |
| ISBN | 1-5090-6356-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996280478803316 |
| New York : , : IEEE, , 2017 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
The Kish cypher : the story of KLJN for unconditional security / / Laszlo B. Kish (Texas A&M University, USA)
| The Kish cypher : the story of KLJN for unconditional security / / Laszlo B. Kish (Texas A&M University, USA) |
| Autore | Kish Laszlo B. |
| Pubbl/distr/stampa | [Hackensack] New Jersey : , : World Scientific, , [2017] |
| Descrizione fisica | 1 online resource (460 pages) : illustrations (some color), color portraits |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Technological innovations
Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-4449-46-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910163090703321 |
Kish Laszlo B.
|
||
| [Hackensack] New Jersey : , : World Scientific, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Quantum Security : Revolutionizing Network Security with Digital IDs / / by Christopher Murphy
| Quantum Security : Revolutionizing Network Security with Digital IDs / / by Christopher Murphy |
| Autore | Murphy Christopher |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 |
| Descrizione fisica | 1 online resource (103 pages) |
| Disciplina | 005.8 |
| Collana | Apress Pocket Guides |
| Soggetto topico |
Computer security - Technological innovations
Quantum computing |
| ISBN | 9798868812408 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. The Origins of Cybersecurity -- Chapter 2. The Devil is in the Details -- Chapter 3. The Science of Authentication -- Chapter 4. The Failure of Indirect Interaction -- Chapter 5. Digital IDs: The Solution That Was Ignored -- Chapter 6. Direct User Interaction: The Game Changer -- Chapter 7. Digital Superposition: A New Layer in Network Security -- Chapter 8. Rethinking Security: Insights from Einstein and Hawking -- Chapter 9. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 10. The Illusion of MFA Compliance -- Chapter 11. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 12. Digital ID: Transforming Key Industries -- Chapter 13. The Mitigations That No Longer Matter -- Chapter 14. The Battle for Integrity in Security -- Chapter 15. Big Data Vs. Network Security -- Chapter 16. The Future of Network Security -- Chapter 17. Implementing the Change -- Chapter 18. Digital ID as the New Endpoint -- Chapter 19. The Inescapable Conflict: Public vs. Private in Cybersecurity -- Chapter 20. The Unified Quantum Security Model: A New Approach to Cybersecurity -- Chapter 21. The Urgency of Action. |
| Record Nr. | UNINA-9910983392803321 |
Murphy Christopher
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Theoretical cybersecurity : principles and advanced concepts / / Jacob G. Oakley [and four others]
| Theoretical cybersecurity : principles and advanced concepts / / Jacob G. Oakley [and four others] |
| Autore | Oakley Jacob G. |
| Pubbl/distr/stampa | Berkeley, California : , : Apress, , [2022] |
| Descrizione fisica | 1 online resource (224 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security - Technological innovations
Computer security - Philosophy Computer security - Forecasting |
| ISBN | 1-4842-8300-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Introduction Chapter 2. A Cyber Taxonomy Chapter 3. Cost Benefit Chapter 4. Roles and Responsibilities Chapter 5. Experimentation Chapter 6. Strategic Cybersecurity Chapter 7. Strategic Defensive Security Chapter 8. Infinite Cybersecurity Chapter 9. Cybersecurity and Game Theory Chapter 10. Game Theory Case Study: Ransomware |
| Record Nr. | UNINA-9910584481203321 |
Oakley Jacob G.
|
||
| Berkeley, California : , : Apress, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||