2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (100 pages) |
Disciplina | 353.00825 |
Soggetto topico |
Emergency management - Technological innovations
Computer security - Technological innovations National security - Technological innovations |
ISBN | 1-5090-0770-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910332525303321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2016 IEEE Symposium on Technologies for Homeland Security : 10-11 May 2016, Waltham, MA, USA, / / IEEE Symposium on Technologies for Homeland Security |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 |
Descrizione fisica | 1 online resource (100 pages) |
Disciplina | 353.00825 |
Soggetto topico |
Emergency management - Technological innovations
Computer security - Technological innovations National security - Technological innovations |
ISBN | 1-5090-0770-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996575435703316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection |
Autore | Mahajan Shilpa |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2024 |
Descrizione fisica | 1 online resource (371 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
KhuranaMehak
EstrelaVania Vieira |
Soggetto topico |
Computer security - Technological innovations
Artificial intelligence Computer networks - Security measures Computer crimes - Prevention |
ISBN |
1-394-19647-4
1-394-19645-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | PART A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges. Analysis of Malicious executables and detection techniques. Detection and Analysis of Botnet Attacks Using Machine Learning Techniques. Artificial Intelligence Perspective on Digital Forensics. Review on Machine Learning-based Traffic Rules Contravention Detection System. Enhancing Cybersecurity Ratings using Artificial Intelligence and DevOps Technologies -- PART B: Cyber Threat Detection and Analysis Using Artificial Intelligence and Big Data. Malware analysis techniques in Android-based Smartphones Applications. Cyber Threat Detection and Mitigation Using Artificial Intelligence - A Cyber-physical Perspective. Performance Analysis of Intrusion Detection System using ML techniques. Spectral Pattern learning approach-based student sentiment analysis using Dense-net multiperception neural network in E-learning Environment. Big Data and Deep Learning Based Tourism Industry Sentiment Analysis Using Deep Spectral Recurrent Neural Network -- PART C: Applied Artificial Intelligence Approaches in Emerging Cyber Security Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. Security in Blockchain-based Smart Applications using Artificial Intelligence (AI). Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data Era. |
Record Nr. | UNINA-9910843799703321 |
Mahajan Shilpa | ||
Newark : , : John Wiley & Sons, Incorporated, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017 |
Pubbl/distr/stampa | New York : , : IEEE, , 2017 |
Descrizione fisica | 1 online resource (210 pages) |
Soggetto topico |
Law enforcement - Technological innovations
Emergency management - Technological innovations Computer security - Technological innovations |
ISBN | 1-5090-6356-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910209342503321 |
New York : , : IEEE, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
HST : 2017 IEEE International Symposium on Technologies for Homeland Security : the Westin-Hotel Waltham-Boston, Waltham, MA, April 25-26, 2017 |
Pubbl/distr/stampa | New York : , : IEEE, , 2017 |
Descrizione fisica | 1 online resource (210 pages) |
Soggetto topico |
Law enforcement - Technological innovations
Emergency management - Technological innovations Computer security - Technological innovations |
ISBN | 1-5090-6356-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280478803316 |
New York : , : IEEE, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The Kish cypher : the story of KLJN for unconditional security / / Laszlo B. Kish (Texas A&M University, USA) |
Autore | Kish Laszlo B. |
Pubbl/distr/stampa | [Hackensack] New Jersey : , : World Scientific, , [2017] |
Descrizione fisica | 1 online resource (460 pages) : illustrations (some color), color portraits |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Technological innovations
Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise |
Soggetto genere / forma | Electronic books. |
ISBN | 981-4449-46-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910163090703321 |
Kish Laszlo B. | ||
[Hackensack] New Jersey : , : World Scientific, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Theoretical cybersecurity : principles and advanced concepts / / Jacob G. Oakley [and four others] |
Autore | Oakley Jacob G. |
Pubbl/distr/stampa | Berkeley, California : , : Apress, , [2022] |
Descrizione fisica | 1 online resource (224 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Technological innovations
Computer security - Philosophy Computer security - Forecasting |
ISBN | 1-4842-8300-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction Chapter 2. A Cyber Taxonomy Chapter 3. Cost Benefit Chapter 4. Roles and Responsibilities Chapter 5. Experimentation Chapter 6. Strategic Cybersecurity Chapter 7. Strategic Defensive Security Chapter 8. Infinite Cybersecurity Chapter 9. Cybersecurity and Game Theory Chapter 10. Game Theory Case Study: Ransomware |
Record Nr. | UNINA-9910584481203321 |
Oakley Jacob G. | ||
Berkeley, California : , : Apress, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|