Illumination of Artificial Intelligence in Cybersecurity and Forensics (eBook, PDF)
128,39 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Illumination of Artificial Intelligence in Cybersecurity and Forensics (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 8.42MB
Andere Kunden interessierten sich auch für
- Multimedia Forensics and Security (eBook, PDF)96,29 €
- Nhien-An Le-KhacA Practical Hands-on Approach to Database Forensics (eBook, PDF)160,49 €
- Information Security Technologies in the Decentralized Distributed Networks (eBook, PDF)128,39 €
- Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 (eBook, PDF)149,79 €
- Advances in Human Factors in Cybersecurity (eBook, PDF)149,79 €
- Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (eBook, PDF)181,89 €
- Cyber Security Intelligence and Analytics (eBook, PDF)213,99 €
-
-
-
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Erscheinungstermin: 8. Februar 2022
- Englisch
- ISBN-13: 9783030934538
- Artikelnr.: 63414161
- Verlag: Springer International Publishing
- Erscheinungstermin: 8. Februar 2022
- Englisch
- ISBN-13: 9783030934538
- Artikelnr.: 63414161
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System.- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks.- Intrusion Detection using Anomaly Detection Algorithm and Snort.- Research Perspective on Digital Forensic Tools and Investigation Process.- Intelligent Authentication Framework for Internet of Medical Things (IoMT).- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network.- A Systematic Literature Review on Face Morphing Attack Detection (MAD).- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection.- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain.- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique.- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method.- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data.- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System.- Authenticated Encryption to Prevent Cyberattacks in images.- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System.- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks.- Intrusion Detection using Anomaly Detection Algorithm and Snort.- Research Perspective on Digital Forensic Tools and Investigation Process.- Intelligent Authentication Framework for Internet of Medical Things (IoMT).- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network.- A Systematic Literature Review on Face Morphing Attack Detection (MAD).- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection.- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain.- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique.- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method.- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data.- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System.- Authenticated Encryption to Prevent Cyberattacks in images.- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.