top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (xvii, 472 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Data protection
Computational Intelligence
Data Engineering
Data and Information Security
ISBN 3-030-57805-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910863154003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
6G Cyber Security Resilience: Trends and Challenges / / edited by H. L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (VIII, 262 p. 60 illus., 54 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Artificial intelligence
Quantum computers
Security systems
Data and Information Security
Artificial Intelligence
Quantum Computing
Security Science and Technology
ISBN 3-031-85008-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis and Comparison of Various Steganography Methods for secure 6G communication -- Image Encryption in the Compressed Domain using Autoencoders for 6G communication -- The Security Design and Challenges of 6G Architecture -- Cyber Security technologies for Privacy in 6G Networks -- Advancements in AI and ML for Enhanced Security and Performance in 6G Networks -- ML-Driven Secure Communication for Next-Generation 6G Networks -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Building a Better Network: The Promising Future of 6G Technology Applications and Challenges -- Blockchain and Distributed Ledger Technology for 6G Security -- 6G Cyber Security Resilience: Trends and Challenges -- IoT and Edge Computing Security: Essential Aspects of 6G Networks -- Enhancing Cyber security in 6G Networks with Federated Learning for Collaborative Threat Mitigation -- Federated Learning for Enhancing Cybersecurity in IoT-Integrated 6G Networks: Challenges, Opportunities, and Future Directions.
Record Nr. UNINA-9911007469103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
70 Tips and Tricks for Mastering the CISSP Exam / / by R. Sarma Danturthi
Autore Danturthi R. Sarma
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XXII, 357 p. 11 illus.)
Disciplina 005.8
Soggetto topico Data protection
Data and Information Security
ISBN 1-4842-6225-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Security and Risk Management -- Chapter 2. Asset Security -- Chapter 3. Security Engineering -- Chapter 4. Communications and Network Security -- Chapter 5. Identity and Access Management -- Chapter 6. Security Assessment and Testing -- Chapter 7. Security Operations -- Chapter 8. Software Development Security -- Chapter 9: Practice Test.
Record Nr. UNINA-9910427046803321
Danturthi R. Sarma  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan
Ad Hoc Networks : 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings / / edited by Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao, Feng Yan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 304 p. 139 illus., 103 illus. in color.)
Disciplina 004.685
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Artificial intelligence
Data protection
Computer Communication Networks
Artificial Intelligence
Data and Information Security
ISBN 3-030-05888-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Ad Hoc Networks -- Resource Allocation -- Routing and Network Planning -- Localization and Tracking -- Handover, Scheduling, and Action Recognition -- Security -- Miscellaneous Topics in Wireless Networks.
Record Nr. UNINA-9910337561603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 366 p. 168 illus.)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Data protection
Cryptography
Data encryption (Computer science)
Algorithms
Computer Communication Networks
Data and Information Security
Cryptology
ISBN 3-642-36958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery.    .
Record Nr. UNINA-9910437573203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Adaptive Autonomous Secure Cyber Systems / / edited by Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 289 p. 68 illus., 59 illus. in color.)
Disciplina 005.8
Soggetto topico Data protection
Artificial intelligence
Computer networks
Data and Information Security
Artificial Intelligence
Computer Communication Networks
ISBN 3-030-33432-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems -- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges -- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense -- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint -- 5. A framework for studying autonomic computing models in cyber deception -- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis -- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions -- 8. Plan Interdiction Games -- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance -- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense -- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies -- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains -- 13. AnEmpirical Study of Secret Security Patch in Open Source Software.
Record Nr. UNINA-9910380755503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced ASP.NET Core 3 Security : Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website / / by Scott Norberg
Advanced ASP.NET Core 3 Security : Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website / / by Scott Norberg
Autore Norberg Scott
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Descrizione fisica 1 online resource (XX, 405 p. 30 illus.)
Disciplina 005.8
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft
Data and Information Security
ISBN 1-4842-6014-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introducing ASP.NET Core -- Chapter 2: General Security Concepts -- Chapter 3: Cryptography -- Chapter 4: Web Security Concepts -- Chapter 5: Understanding Common Attacks -- Chapter 6: Processing User Input -- Chapter 7: Authentication and Authorization -- Chapter 8: Data Access and Storage. - Chapter 9: Logging and Error Handling -- Chapter 10: Setup and Configuration -- Chapter 11: Secure Application Life Cycle Management.
Record Nr. UNINA-9910427050303321
Norberg Scott  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced ASP.NET Core 8 Security : Move Beyond ASP.NET Documentation and Learn Real Security / / by Scott Norberg
Advanced ASP.NET Core 8 Security : Move Beyond ASP.NET Documentation and Learn Real Security / / by Scott Norberg
Autore Norberg Scott
Edizione [2nd ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (470 pages)
Disciplina 005.268
Soggetto topico Microsoft software
Microsoft .NET Framework
Data protection
Microsoft
Data and Information Security
ISBN 979-88-6880-494-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Intro to Security -- Chapter 2: Software Security Overview -- Chapter 3: Web Security -- Chapter 4: Thinking Like a Hacker -- Chapter 5: Introduction to ASP.NET Core Security -- Chapter 6: Cryptography -- Chapter 7: Processing User Input -- Chapter 8: Data Access and Storage -- Chapter 9: Authentication and Authorization -- Chapter 10: Advanced Web Security -- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).
Record Nr. UNINA-9910896177903321
Norberg Scott  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part II / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XVIII, 283 p. 97 illus., 77 illus. in color.)
Disciplina 006
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 3-031-45124-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhanced Prediction of Heart Disease using Machine Learning and Deep Learning -- Machine Learning-Powered Tool for Automated Healthcare Diagnosis -- Development and Evaluation of an Artificial Intelligence-Based System for Pancreatic Cancer Detection and Diagnosis -- Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Robust Neurodegenerative Disease Detection Using Machine Learning Algorithms -- Real-Time Drowsiness Detection System Using Machine Learning -- Hate Speech Detection in Multi-Social Media Using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Breast Cancer Detection by using Decision Tree -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- Sugarcane Leaf Disease Classification using Deep Learning -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- A Comprehensive Review of the Latest Advancements in Large Generative AI Models -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Cloud Computing Enabled Autonomous Forest Fire Surveillance System Using Internet-of-Things -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- RECOGNITION OF VARITIES OF RICE USING DEEP LEARNING TECHNOLOGIES -- Optimizing Pneumonia Diagnosis through Local Binary Pattern and 2D-Wavelet Transform Based Feature Extraction and Classification -- Recognition of Infant Footprint: A Review of Advanced Techniques -- Method Comparison for Predicting Student Retention at a Private School in Indonesia -- Distribution and Semantics of Terms with the Component ‘White’ in the Bulgarian Language: a Statistical Approach -- Sanskrit OCR System -- Information Technology and Fintech Innovation and its effect on Indian Financial Services -- Application of Neural Networks and Genetic Algorithms in establishing Logical Rules for evaluating the edibility of Mushroom Data -- A Review on Machine Learning based Security in Edge Computing Environment -- Multiple linear regression based analysis of weather data : Assumptions and Limitations -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Sentiment Analysis of user-generated data using CNN-BiLSTM model -- Performance of Bayesian Networks Classification Models for Tuberculosis Patient Outcome Prediction with Imbalanced Dataset -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Development of Facial Emotion Recognition System using Unimodal and Multimodal approach -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNISA-996558569803316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Advanced Communication and Intelligent Systems [[electronic resource] ] : Second International Conference, ICACIS 2023, Warsaw, Poland, June 16–17, 2023, Revised Selected Papers, Part I / / edited by Rabindra Nath Shaw, Marcin Paprzycki, Ankush Ghosh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (287 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Image processing - Digital techniques
Computer vision
Artificial intelligence
Computer engineering
Computer networks
Data protection
Application software
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
Computer Engineering and Networks
Data and Information Security
Computer and Information Systems Applications
ISBN 3-031-45121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparative Analysis of Deep Learning Architectures for Garbage Classification -- Developing an Automated System for Pothole Detection and Management using Deep Learning -- Collating Weather Data and Grocery Cost using Machine Learning Techniques -- Integrating Scene and Text Recognition for Improved Scene Caption to assist Visually Impaired -- An Analysis of Current Advancements: Elderly Fall Detection Systems Using Machine Learning Techniques -- DLMEKL: Design of an efficient Deep Learning Model for analyzing the effect of ECG & EEG disturbances on Kidney, Lungs and Liver functions -- Integration of IoT and Industry 4.0: Revolutionizing Industrial Processes -- Artificial Intelligence based Optimized Traffic Diversion System in Smart Cities -- Understanding Career Trajectories of IT professionals -A Machine Learning Approach -- A Review on Machine Learning based Security in Edge Computing Environment -- Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review -- Analysis And Design of Document Similarity Using BiLSTM and BERT -- Customer Churn Analysis for Live Stream E-Commerce Platforms by Using Decision Tree Method -- Estimation of Reliability, BER, BLER and throughput during the coexistence of 4G LTE and 5G NR -- Exploring the Future of Edge Computing: Advantages, Limitations, and Opportunities -- Fake Product Review Detection Using Machine Learning -- A survey on Designing Efficient WSN using Duty Cycle optimization -- A Novel Framework for Harnessing AI for Evidence-Based Policymaking in E-Governance Using Smart Contracts -- Vehicular Ad-hoc Networks: A Review on Applications & Security -- An Approach for Efficient Experts Selection in Team Formation Problems -- Cybersecurity Model for Mobile and Web Application Banking Sectors.
Record Nr. UNISA-996558569703316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui

Opere

Altro...

Lingua di pubblicazione

Altro...

Data

Data di pubblicazione

Altro...