Author: Michael Karner
Publisher: Springer Nature
ISBN: 3031540492
Category :
Languages : en
Pages : 446
Book Description
Intelligent Secure Trustable Things
Author: Michael Karner
Publisher: Springer Nature
ISBN: 3031540492
Category :
Languages : en
Pages : 446
Book Description
Publisher: Springer Nature
ISBN: 3031540492
Category :
Languages : en
Pages : 446
Book Description
Business Development via AI and Digitalization
Author: Allam Hamdan
Publisher: Springer Nature
ISBN: 3031621026
Category :
Languages : en
Pages : 1016
Book Description
Publisher: Springer Nature
ISBN: 3031621026
Category :
Languages : en
Pages : 1016
Book Description
Intelligent Secure Trustable Things
Author: Michael Karner
Publisher: Springer
ISBN: 9783031540486
Category : Technology & Engineering
Languages : en
Pages : 0
Book Description
This open access book provides an overview about results of the InSecTT project. Artificial Intelligence of Things (AIoT) is the natural evolution for both Artificial Intelligence (AI) and Internet of Things (IoT) because they are mutually beneficial. AI increases the value of the IoT through machine learning by transforming the data into useful information, while the IoT increases the value of AI through connectivity and data exchange. Therefore, InSecTT—Intelligent Secure Trustable Things, a pan-European effort with over 50 key partners from 12 countries (EU and Turkey), provides intelligent, secure and trustworthy systems for industrial applications to provide comprehensive cost-efficient solutions of intelligent, end-to-end secure, trustworthy connectivity and interoperability to bring the Internet of Things and Artificial Intelligence together. InSecTT creates trust in AI-based intelligent systems and solutions as a major part of the AIoT. InSecTT fosters cooperation between big industrial players from various domains, a number of highly innovative SMEs distributed all over Europe and cutting-edge research organizations and universities. The project features a big variety of industry-driven use cases embedded into various application domains where Europe is in a leading position, i.e., smart infrastructure, building, manufacturing, automotive, aeronautics, railway, urban public transport, maritime as well as health. The demonstration of InSecTT solutions in well-known real-world environments like airports, trains, ports and the health sector shows their applicability on both high and broad level, going from citizens to European stakeholders. The first part of the book provides an introduction into the main topics of the InSecTT project: How to bring Internet of Things and Artificial Intelligence together to form the Artificial Intelligence of Things, a reference architecture for such kind of systems and how to develop trustworthy, ethical AI systems. In the second part, we show the development of essential technologies for creating trustworthy AIoT systems. The third part of the book is composed of a broad variety of examples on how to design, develop and validate trustworthy AIoT systems for industrial applications (including automotive, avionics, smart infrastructure, health care, manufacturing and railway).
Publisher: Springer
ISBN: 9783031540486
Category : Technology & Engineering
Languages : en
Pages : 0
Book Description
This open access book provides an overview about results of the InSecTT project. Artificial Intelligence of Things (AIoT) is the natural evolution for both Artificial Intelligence (AI) and Internet of Things (IoT) because they are mutually beneficial. AI increases the value of the IoT through machine learning by transforming the data into useful information, while the IoT increases the value of AI through connectivity and data exchange. Therefore, InSecTT—Intelligent Secure Trustable Things, a pan-European effort with over 50 key partners from 12 countries (EU and Turkey), provides intelligent, secure and trustworthy systems for industrial applications to provide comprehensive cost-efficient solutions of intelligent, end-to-end secure, trustworthy connectivity and interoperability to bring the Internet of Things and Artificial Intelligence together. InSecTT creates trust in AI-based intelligent systems and solutions as a major part of the AIoT. InSecTT fosters cooperation between big industrial players from various domains, a number of highly innovative SMEs distributed all over Europe and cutting-edge research organizations and universities. The project features a big variety of industry-driven use cases embedded into various application domains where Europe is in a leading position, i.e., smart infrastructure, building, manufacturing, automotive, aeronautics, railway, urban public transport, maritime as well as health. The demonstration of InSecTT solutions in well-known real-world environments like airports, trains, ports and the health sector shows their applicability on both high and broad level, going from citizens to European stakeholders. The first part of the book provides an introduction into the main topics of the InSecTT project: How to bring Internet of Things and Artificial Intelligence together to form the Artificial Intelligence of Things, a reference architecture for such kind of systems and how to develop trustworthy, ethical AI systems. In the second part, we show the development of essential technologies for creating trustworthy AIoT systems. The third part of the book is composed of a broad variety of examples on how to design, develop and validate trustworthy AIoT systems for industrial applications (including automotive, avionics, smart infrastructure, health care, manufacturing and railway).
Artificial Intelligence Applications and Innovations
Author: Ilias Maglogiannis
Publisher: Springer Nature
ISBN: 3031083334
Category : Computers
Languages : en
Pages : 541
Book Description
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
Publisher: Springer Nature
ISBN: 3031083334
Category : Computers
Languages : en
Pages : 541
Book Description
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Author: Sagayam, K. Martin
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Artificial Intelligence and Security
Author: Xingming Sun
Publisher: Springer Nature
ISBN: 3030786129
Category : Computers
Languages : en
Pages : 766
Book Description
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
Publisher: Springer Nature
ISBN: 3030786129
Category : Computers
Languages : en
Pages : 766
Book Description
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
Trusted Computing and Information Security
Author: Weili Han
Publisher: Springer Nature
ISBN: 9811534187
Category : Computers
Languages : en
Pages : 367
Book Description
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.
Publisher: Springer Nature
ISBN: 9811534187
Category : Computers
Languages : en
Pages : 367
Book Description
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.
Secure and Trusted Cyber Physical Systems
Author: Shantanu Pal
Publisher: Springer Nature
ISBN: 3031082702
Category : Technology & Engineering
Languages : en
Pages : 219
Book Description
This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development in strategic applications in mission-critical systems, including large-scale Industrial IoT, Industry 4.0, and Industrial Control Systems. As such, the book offers an essential reference guide about the latest design and development in CPS for students, engineers, designers, and professional developers.
Publisher: Springer Nature
ISBN: 3031082702
Category : Technology & Engineering
Languages : en
Pages : 219
Book Description
This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security solutions and future research directions for large-scale CPS, including its various challenges and significant security requirements. Furthermore, the book provides practical guidance on delivering robust, privacy, and trust-aware CPS at scale. Finally, the book presents a holistic insight into IoT technologies, particularly its latest development in strategic applications in mission-critical systems, including large-scale Industrial IoT, Industry 4.0, and Industrial Control Systems. As such, the book offers an essential reference guide about the latest design and development in CPS for students, engineers, designers, and professional developers.
Cyber Security Intelligence and Analytics
Author: Zheng Xu
Publisher: Springer Nature
ISBN: 3030978745
Category : Technology & Engineering
Languages : en
Pages : 1084
Book Description
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Publisher: Springer Nature
ISBN: 3030978745
Category : Technology & Engineering
Languages : en
Pages : 1084
Book Description
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Applying Computational Intelligence for Social Good
Author:
Publisher: Elsevier
ISBN: 0323885454
Category : Mathematics
Languages : en
Pages : 288
Book Description
Applying Computational Intelligence for Social Good: Track, Understand and Build a Better World, Volume 132 presents views on how Computational Intelligent and ICT technologies can be applied to ease or solve social problems by sharing examples of research results from studies of social anxiety, environmental issues, mobility of the disabled, and problems in social safety. Sample chapters in this release include Why is implementing Computational Intelligence for social good so challenging? Principles and its Application, Smart crisis management system for road accidents using Geo-Spacial Machine Learning Techniques, Residential Energy Management System (REMS) Using Machine Learning, Text-Based Personality Prediction using XLNet, and much more. - Explores a number of key themes, including self-organization, complex adaptive systems, and emergent computation for solving socially relevant problems - Focuses on Forecasting applications, Human Behavior and Critics response analysis in social forums, Healthcare monitoring Systems, Disaster Management, Industrial management, and most recently, Epidemics and Outbreaks - Brings together many different aspects of the current research on intelligence technologies, such as neural networks, support vector machines, fuzzy logic, and evolutionary computation
Publisher: Elsevier
ISBN: 0323885454
Category : Mathematics
Languages : en
Pages : 288
Book Description
Applying Computational Intelligence for Social Good: Track, Understand and Build a Better World, Volume 132 presents views on how Computational Intelligent and ICT technologies can be applied to ease or solve social problems by sharing examples of research results from studies of social anxiety, environmental issues, mobility of the disabled, and problems in social safety. Sample chapters in this release include Why is implementing Computational Intelligence for social good so challenging? Principles and its Application, Smart crisis management system for road accidents using Geo-Spacial Machine Learning Techniques, Residential Energy Management System (REMS) Using Machine Learning, Text-Based Personality Prediction using XLNet, and much more. - Explores a number of key themes, including self-organization, complex adaptive systems, and emergent computation for solving socially relevant problems - Focuses on Forecasting applications, Human Behavior and Critics response analysis in social forums, Healthcare monitoring Systems, Disaster Management, Industrial management, and most recently, Epidemics and Outbreaks - Brings together many different aspects of the current research on intelligence technologies, such as neural networks, support vector machines, fuzzy logic, and evolutionary computation