Author: Alejandro Pasos
Publisher:
ISBN:
Category :
Languages : en
Pages : 110
Book Description
Machine Learning Techniques in Masquerader Detection
Author: Alejandro Pasos
Publisher:
ISBN:
Category :
Languages : en
Pages : 110
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 110
Book Description
Machine Learning: Theory and Applications
Author:
Publisher: Newnes
ISBN: 0444538666
Category : Computers
Languages : en
Pages : 551
Book Description
Statistical learning and analysis techniques have become extremely important today, given the tremendous growth in the size of heterogeneous data collections and the ability to process it even from physically distant locations. Recent advances made in the field of machine learning provide a strong framework for robust learning from the diverse corpora and continue to impact a variety of research problems across multiple scientific disciplines. The aim of this handbook is to familiarize beginners as well as experts with some of the recent techniques in this field.The Handbook is divided in two sections: Theory and Applications, covering machine learning, data analytics, biometrics, document recognition and security. - Very relevant to current research challenges faced in various fields - Self-contained reference to machine learning - Emphasis on applications-oriented techniques
Publisher: Newnes
ISBN: 0444538666
Category : Computers
Languages : en
Pages : 551
Book Description
Statistical learning and analysis techniques have become extremely important today, given the tremendous growth in the size of heterogeneous data collections and the ability to process it even from physically distant locations. Recent advances made in the field of machine learning provide a strong framework for robust learning from the diverse corpora and continue to impact a variety of research problems across multiple scientific disciplines. The aim of this handbook is to familiarize beginners as well as experts with some of the recent techniques in this field.The Handbook is divided in two sections: Theory and Applications, covering machine learning, data analytics, biometrics, document recognition and security. - Very relevant to current research challenges faced in various fields - Self-contained reference to machine learning - Emphasis on applications-oriented techniques
Guide to Vulnerability Analysis for Computer Networks and Systems
Author: Simon Parkinson
Publisher: Springer
ISBN: 3319926241
Category : Computers
Languages : en
Pages : 381
Book Description
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
Publisher: Springer
ISBN: 3319926241
Category : Computers
Languages : en
Pages : 381
Book Description
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
Artificial Intelligence and Machine Learning Techniques for Civil Engineering
Author: Plevris, Vagelis
Publisher: IGI Global
ISBN: 1668456443
Category : Technology & Engineering
Languages : en
Pages : 404
Book Description
In recent years, artificial intelligence (AI) has drawn significant attention with respect to its applications in several scientific fields, varying from big data handling to medical diagnosis. A tremendous transformation has taken place with the emerging application of AI. AI can provide a wide range of solutions to address many challenges in civil engineering. Artificial Intelligence and Machine Learning Techniques for Civil Engineering highlights the latest technologies and applications of AI in structural engineering, transportation engineering, geotechnical engineering, and more. It features a collection of innovative research on the methods and implementation of AI and machine learning in multiple facets of civil engineering. Covering topics such as damage inspection, safety risk management, and information modeling, this premier reference source is an essential resource for engineers, government officials, business leaders and executives, construction managers, students and faculty of higher education, librarians, researchers, and academicians.
Publisher: IGI Global
ISBN: 1668456443
Category : Technology & Engineering
Languages : en
Pages : 404
Book Description
In recent years, artificial intelligence (AI) has drawn significant attention with respect to its applications in several scientific fields, varying from big data handling to medical diagnosis. A tremendous transformation has taken place with the emerging application of AI. AI can provide a wide range of solutions to address many challenges in civil engineering. Artificial Intelligence and Machine Learning Techniques for Civil Engineering highlights the latest technologies and applications of AI in structural engineering, transportation engineering, geotechnical engineering, and more. It features a collection of innovative research on the methods and implementation of AI and machine learning in multiple facets of civil engineering. Covering topics such as damage inspection, safety risk management, and information modeling, this premier reference source is an essential resource for engineers, government officials, business leaders and executives, construction managers, students and faculty of higher education, librarians, researchers, and academicians.
Recent Advances in Intrusion Detection
Author: Robin Sommer
Publisher: Springer
ISBN: 3642236448
Category : Computers
Languages : en
Pages : 407
Book Description
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
Publisher: Springer
ISBN: 3642236448
Category : Computers
Languages : en
Pages : 407
Book Description
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
Enhancing Computer Security with Smart Technology
Author: V. Rao Vemuri
Publisher: CRC Press
ISBN: 1420031228
Category : Computers
Languages : en
Pages : 288
Book Description
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems relat
Publisher: CRC Press
ISBN: 1420031228
Category : Computers
Languages : en
Pages : 288
Book Description
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems relat
Advances in Computing and Communications, Part II
Author: Ajith Abraham
Publisher: Springer Science & Business Media
ISBN: 3642227139
Category : Computers
Languages : en
Pages : 744
Book Description
This volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 72 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on database and information systems; distributed software development; human computer interaction and interface; ICT; internet and Web computing; mobile computing; multi agent systems; multimedia and video systems; parallel and distributed algorithms; security, trust and privacy.
Publisher: Springer Science & Business Media
ISBN: 3642227139
Category : Computers
Languages : en
Pages : 744
Book Description
This volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 72 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on database and information systems; distributed software development; human computer interaction and interface; ICT; internet and Web computing; mobile computing; multi agent systems; multimedia and video systems; parallel and distributed algorithms; security, trust and privacy.
Digital Forensic Investigation of Internet of Things (IoT) Devices
Author: Reza Montasari
Publisher: Springer Nature
ISBN: 303060425X
Category : Computers
Languages : en
Pages : 290
Book Description
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
Publisher: Springer Nature
ISBN: 303060425X
Category : Computers
Languages : en
Pages : 290
Book Description
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and ‘smart’ home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
Information and Communication Technology and Applications
Author: Sanjay Misra
Publisher: Springer Nature
ISBN: 3030691438
Category : Computers
Languages : en
Pages : 762
Book Description
This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning; Information Security Privacy and Trust; Information Science and Technology.
Publisher: Springer Nature
ISBN: 3030691438
Category : Computers
Languages : en
Pages : 762
Book Description
This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning; Information Security Privacy and Trust; Information Science and Technology.
Research Anthology on Machine Learning Techniques, Methods, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668462923
Category : Computers
Languages : en
Pages : 1516
Book Description
Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.
Publisher: IGI Global
ISBN: 1668462923
Category : Computers
Languages : en
Pages : 1516
Book Description
Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.