語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Illumination of artificial intellige...
~
Arumugam, Chamundeswari.
FindBook
Google Book
Amazon
博客來
Illumination of artificial intelligence in cybersecurity and forensics
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Illumination of artificial intelligence in cybersecurity and forensics/ edited by Sanjay Misra, Chamundeswari Arumugam.
其他作者:
Arumugam, Chamundeswari.
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xv, 372 p. :ill., digital ;24 cm.
內容註:
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System -- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research Perspective on Digital Forensic Tools and Investigation Process -- Intelligent Authentication Framework for Internet of Medical Things (IoMT) -- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network -- A Systematic Literature Review on Face Morphing Attack Detection (MAD) -- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection -- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain -- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique -- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method -- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data -- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System -- Authenticated Encryption to Prevent Cyberattacks in images -- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
Contained By:
Springer Nature eBook
標題:
Artificial intelligence - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-93453-8
ISBN:
9783030934538
Illumination of artificial intelligence in cybersecurity and forensics
Illumination of artificial intelligence in cybersecurity and forensics
[electronic resource] /edited by Sanjay Misra, Chamundeswari Arumugam. - Cham :Springer International Publishing :2022. - xv, 372 p. :ill., digital ;24 cm. - Lecture notes on data engineering and communications technologies,v. 1092367-4520 ;. - Lecture notes on data engineering and communications technologies ;v. 109..
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System -- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research Perspective on Digital Forensic Tools and Investigation Process -- Intelligent Authentication Framework for Internet of Medical Things (IoMT) -- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network -- A Systematic Literature Review on Face Morphing Attack Detection (MAD) -- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection -- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain -- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique -- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method -- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data -- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System -- Authenticated Encryption to Prevent Cyberattacks in images -- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum-Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
ISBN: 9783030934538
Standard No.: 10.1007/978-3-030-93453-8doiSubjects--Topical Terms:
3595924
Artificial intelligence
--Security measures.
LC Class. No.: Q335 / .I55 2022
Dewey Class. No.: 006.3
Illumination of artificial intelligence in cybersecurity and forensics
LDR
:03733nmm a2200337 a 4500
001
2298917
003
DE-He213
005
20220208061053.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030934538
$q
(electronic bk.)
020
$a
9783030934521
$q
(paper)
024
7
$a
10.1007/978-3-030-93453-8
$2
doi
035
$a
978-3-030-93453-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q335
$b
.I55 2022
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q335
$b
.I29 2022
245
0 0
$a
Illumination of artificial intelligence in cybersecurity and forensics
$h
[electronic resource] /
$c
edited by Sanjay Misra, Chamundeswari Arumugam.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xv, 372 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes on data engineering and communications technologies,
$x
2367-4520 ;
$v
v. 109
505
0
$a
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System -- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research Perspective on Digital Forensic Tools and Investigation Process -- Intelligent Authentication Framework for Internet of Medical Things (IoMT) -- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network -- A Systematic Literature Review on Face Morphing Attack Detection (MAD) -- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection -- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain -- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique -- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method -- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data -- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System -- Authenticated Encryption to Prevent Cyberattacks in images -- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
520
$a
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum-Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
650
0
$a
Artificial intelligence
$x
Security measures.
$3
3595924
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data Engineering.
$3
3409361
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Arumugam, Chamundeswari.
$3
3595922
700
1
$a
Misra, Sanjay.
$3
3411943
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes on data engineering and communications technologies ;
$v
v. 109.
$3
3595923
856
4 0
$u
https://doi.org/10.1007/978-3-030-93453-8
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9440809
電子資源
11.線上閱覽_V
電子書
EB Q335 .I55 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入