Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 PDF Author: Hani Ragab Hassen
Publisher: Springer Nature
ISBN: 303095918X
Category : Technology & Engineering
Languages : en
Pages : 150

Get Book Here

Book Description
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 PDF Author: Hani Ragab Hassen
Publisher: Springer Nature
ISBN: 303095918X
Category : Technology & Engineering
Languages : en
Pages : 150

Get Book Here

Book Description
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.

SPS2022

SPS2022 PDF Author: A.H.C. Ng
Publisher: IOS Press
ISBN: 1643682695
Category : Technology & Engineering
Languages : en
Pages : 874

Get Book Here

Book Description
The realization of a successful product requires collaboration between developers and producers, taking account of stakeholder value, reinforcing the contribution of industry to society and enhancing the wellbeing of workers while respecting planetary boundaries. Founded in 2006, the Swedish Production Academy (SPA) aims to drive and develop production research and education and to increase cooperation within the production area. This book presents the proceedings of the 10th Swedish Production Symposium (SPS2022), held in Skövde, Sweden, from 26-29 April 2022. The overall theme of the symposium was ‘Industry 5.0 Transformation – Towards a Sustainable, Human-Centric, and Resilient Production’. Since its inception in 2007, the purpose of SPS has been to facilitate an event at which members and interested participants from industry and academia can meet to exchange ideas. The 69 papers accepted for presentation here are grouped into ten sections: resource-efficient production; flexible production; humans in the production system; circular production systems and maintenance; integrated product and production development; industrial optimization and decision-making; cyber-physical production systems and digital twins; innovative production processes and additive manufacturing; smart and resilient supply chains; and linking research and education. Also included are three sections covering the Special Sessions at SPS2022: artificial intelligence and industrial analytics in industry 4.0; development of resilient and sustainable production systems; and boundary crossing and boundary objects in product and production development. The book will be of interest to all those involved in the development and production of future products.

Autonomic Computing in Cloud Resource Management in Industry 4.0

Autonomic Computing in Cloud Resource Management in Industry 4.0 PDF Author: Tanupriya Choudhury
Publisher: Springer Nature
ISBN: 3030717569
Category : Technology & Engineering
Languages : en
Pages : 409

Get Book Here

Book Description
This book describes the next generation of industry—Industry 4.0—and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management CRM techniques with proper propped solution for IT organizations. The book features chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.

Data Science and Emerging Technologies

Data Science and Emerging Technologies PDF Author: Yap Bee Wah
Publisher: Springer Nature
ISBN: 9819702933
Category :
Languages : en
Pages : 574

Get Book Here

Book Description


Inventive Communication and Computational Technologies

Inventive Communication and Computational Technologies PDF Author: G. Ranganathan
Publisher: Springer Nature
ISBN: 9819951666
Category : Technology & Engineering
Languages : en
Pages : 1128

Get Book Here

Book Description
This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22–23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of things, social networks, mobile communications, big data analytics, bio-inspired computing and cloud computing. The book is exclusively intended for academics and practitioners working to resolve practical issues in this area.

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC Picom DataCom CyberSciTech)

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC Picom DataCom CyberSciTech) PDF Author: IEEE Staff
Publisher:
ISBN: 9781538675199
Category :
Languages : en
Pages :

Get Book Here

Book Description
IEEE CyberSciTech 18 aims to offer a platform for scientists, researchers, and engineers to share their latest ideas & exchange the latest developments and outcomes in their research and technologies, with a broad scope of cyber related science, technology, and application topics to understand & shape new cyber enabled worlds IEEE DASC 18 aims to bring together computer scientists, industrial engineers, and researchers to discuss & exchange experimental & theoretical results, novel designs, work in progress, experience, & trend setting ideas in the areas of dependability, security, trust and or autonomic computing systems IEEE PiCOM 18 aims to bring together computer scientists & engineers, to discuss & exchange experimental & theoretical results, work in progress, novel designs, & test environments or test beds in the areas of Pervasive Intelligence and Computing IEEE DataCom 18 aims to bring scientists to present their ideas and experiences in the fields of Big Data intelligence and computing

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC Picom DataCom CyberSciTech)

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC Picom DataCom CyberSciTech) PDF Author: IEEE Staff
Publisher:
ISBN: 9781509040667
Category :
Languages : en
Pages :

Get Book Here

Book Description
The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers This calls for the autonomic computing paradigm, which meets the requirements of self management by providing self optimization, self healing, self configuration, and self protection As a promising means to implement dependable and secure systems in a self managing manner, autonomic computing needs to be further explored On the other hand, any autonomic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail Trusted and autonomic computing and communications need synergistic research efforts covering many disciplines, and scientific and technological advances in a wide variety of fields, including but not limited to new software, system architecture, Cyber Physical Systems and communication systems that support the effective and coherent integration of the constituent technologies

Face Recognition in Adverse Conditions

Face Recognition in Adverse Conditions PDF Author: De Marsico, Maria
Publisher: IGI Global
ISBN: 146665967X
Category : Computers
Languages : en
Pages : 506

Get Book Here

Book Description
Facial recognition software has improved by leaps and bounds over the past few decades, with error rates decreasing significantly within the past ten years. Though this is true, conditions such as poor lighting, obstructions, and profile-only angles have continued to persist in preventing wholly accurate readings. Face Recognition in Adverse Conditions examines how the field of facial recognition takes these adverse conditions into account when designing more effective applications by discussing facial recognition under real world PIE variations, current applications, and the future of the field of facial recognition research. The work is intended for academics, engineers, and researchers specializing in the field of facial recognition.

Human Recognition in Unconstrained Environments

Human Recognition in Unconstrained Environments PDF Author: Maria De Marsico
Publisher: Academic Press
ISBN: 0081007124
Category : Computers
Languages : en
Pages : 250

Get Book Here

Book Description
Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data Presents a complete picture of the biometric recognition processing chain, ranging from data acquisition to the reaction procedures against security incidents Provides specific requirements and issues behind each typical phase of the development of a robust biometric recognition system Includes a contextualization of the ethical/privacy issues behind the development of a covert recognition system which can be used for forensics and security activities

The Cloud-to-Thing Continuum

The Cloud-to-Thing Continuum PDF Author: Theo Lynn
Publisher: Springer Nature
ISBN: 3030411109
Category : Business & Economics
Languages : en
Pages : 183

Get Book Here

Book Description
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.