Описание: AI Ethics - Law.- The Ethos of Artificial Intelligence as a Legal Personality in a Globalized Space: Examining the Need to Overhaul the Post-Liberal Order.- Trustworthy AI Needs Unbiased Dictators!.- AI Constraints.- An Introduction of FD-Complete Constraints.- Backward-Forward Sequence Generative Network for Multiple Lexical Constraints.- Deep Learning - LSTM.- Deep Echo State Networks in Industrial Applications.- Deepbots: A Webots-based Deep Reinforcement Learning Framework for Robotics.- Innovative Deep Neural Network Fusion for Pairwise Translation Evaluation.- Introducing an edge-native deep learning platform for exergames.- Investigating the problem of cryptocurrency price prediction - A deep learning approach.- Regularized Evolution for Macro Neural Architecture Search.- Using Multimodal Contextual Process Information for the Supervised Detection of Connector Lock Events.- A machine learning model to detect speech and reading pathologies.- Forecasting Hazard Level Of Air Pollutants Using LSTM's.- Fuzzy Algebra - Fuzzy Systems.- Hypotheses tests using non-asymptotic fuzzy estimators and fuzzy critical values.- Preservation of the Exchange Principle via Lattice Operations on (S, N)- Implications.- Versatile Internet of Things for Agriculture: An eXplainable AI Approach.- Machine Learning.- Acoustic Resonance Testing of Glass IV Bottles.- AI based Real-Time Signal Reconstruction for Wind Farm with SCADA Sensor Failure.- Autonomous Navigation for Drone Swarms in GPS-Denied Environments using Structured Learning.- Chemical Laboratories 4.0: A Two-stage Machine Learning System for Predicting the Arrival of Samples.- Predicting Physical Properties of Woven Fabrics via Automated Machine Learning and Textile Design and Finishing Features.- Real-time Surf Manoeuvres' Detection Using Smartphones' Inertial Sensors.- SDN-enabled IoT Anomaly Detection using Ensemble Learning.- Harnessing Social Interactions on Twitter for Smart Transportation Using Machine Learning.- Medical - Health System.- An intelligent cloud-based platform for effective monitoring of patients with psychotic disorders.- Applying Deep Learning to Predicting Dementia and Mild Cognitive Impairment.- Bridging the Gap between AI and Healthcare Sides: Towards Developing Clinically Relevant AI-Powered Diagnosis Systems.- Know Yourself: An Adaptive Causal Network Model for Therapeutic Intervention for Regaining Cognitive Control.- Multi-omics data and analytics integration in ovarian cancer.- Overlap-based Undersampling Method for Classification of Imbalanced Medical Datasets.- Natural Language.- An Overview of Chatbot Technology.- Applying an Intelligent Personal Agent on a Smart Home using a Novel Dialogue Generator.- Exploring NLP and Information Extraction to jointly address Question Generation and Answering.- Hong Kong Protests: Using Natural Language Processing for Fake News Detection on Twitter.- On the Learnability of Concepts With Applications to Comparing Word EmbeddingAlgorithms.- Towards fashion recommendation: An AI system for clothing data retrieval and analysis.- Greek Lyrics Generation.
Описание: Constitutes the refereed proceedings of the IFIP TC 11 23rd International Information Security Conference held at the 20th World Computer Congress in Milano, Italy on September 7-10, 2008. This book features proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields.
Описание: These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference.
Описание: This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019. The 26 revised full papers presented were carefully reviewed and selected from 76 submissions.
Classification.- An Adaptive Approach on Credit Card Fraud Detection using Transaction Aggregation and Word Embeddings.- Boosted Ensemble Learning for Anomaly Detection in 5G RAN.- Machine Learning for Cognitive Load Classification - a Case Study on Contact-free Approach.- Real-time prediction of online shoppers' purchasing intention using random forest.- Using Classification for Traffic Prediction in Smart Cities.- Using Twitter to Predict Chart Position for Songs.- Α Benchmarking of IBM, Google and Wit Automatic Speech Recognition Systems.- Clustering - Unsupervised Learning - Analytics.- A two-levels data anonymization approach.- An innovative graph-based approach to advance feature selection from multiple textual documents.- k-means Cluster Shape Implications.- Manifold learning for innovation funding: identification of potential funding recipients.- Network aggregation to enhance results derived from multiple analytics.- PolicyCLOUD: Analytics as a Service facilitating efficient data-driven public policy management.- Demand Forecasting of Short Life Cycle Products using Data Mining Techniques.- Image Processing.- Arbitrary Scale Super-Resolution for Brain MRI Images.- Knowledge-based fusion for image tampering localization.- Transfer Learning using Convolutional Neural Network Architectures for Brain Tumor Classification from MRI Images.- Learning Algorithms.- A Novel Learning Automata-based Strategy to Generate Melodies from Chordal Inputs.- Graph Neural Networks to Advance Anticancer Drug Design.- Optimizing Self-Organizing Lists-on-Lists using Transitivity and Pursuit-Enhanced Object Partitioning.- Task-Projected Hyperdimensional Computing for Multi-Task Learning.- Neural Network Modeling.- Cross-domain Authorship Attribution Using Pre-trained Language Models.- Indoor Localization with Multi-Objective selection of Radiomap Models.- STDP Plasticity in TRN within Hierarchical Spike Timing Model of Visual Information Processing.- Tensor-based CUDA Optimization for ANN Inferencing using Parallel Acceleration on Embedded GPU.- The Random Neural Network in Price Predictions.- Object Tracking - Object Detection Systems.- Joint Multi-Object Detection and Segmentation from an Untrimmed Video.- Robust 3D Detection in Traffic Scenario with Tracking-based Coupling System.- Ontologies - AI.- Automated MeSH Indexing of Biomedical Literature using Contextualized Word Representations.- Knowledge-based Management and Reasoning on Cultural and Natural Touristic Routes.- Ontological Foundations of Modelling Security Policies for Logical Analytics.- RDF reasoning on large ontologies: a study on cultural heritage and Wikidata.- Sentiment Analysis - Recommender Systems.- A deep learning approach to aspect-based sentiment prediction.- On the reusability of sentiment analysis datasets in real-life applications.- Opinion Mining of Consumer Reviews Using Deep Neural Networks with Word-Sentiment Associations.- Sentiment Analysis on Movie Scripts and Reviews: Utilizing sentiment scores in rating prediction.- The MuseLearn platform: personalized content for museum visitors assisted by vision-based recognition and 3D pose estimation of exhibits.- Promoting Diversity in Content Based Recommendation using Feature Weighting and LSH.
Автор: Lech Jan Janczewski; Miros?aw Kuty?owski Название: ICT Systems Security and Privacy Protection ISBN: 3030076369 ISBN-13(EAN): 9783030076368 Издательство: Springer Рейтинг: Цена: 14674.00 р. Наличие на складе: Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
The 27 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in the following topical sections: authentication, failures of security management, security management/forensic, and software security/attacks.
Автор: Gurpreet Dhillon; Fredrik Karlsson; Karin Hedstr?m Название: ICT Systems Security and Privacy Protection ISBN: 3030223116 ISBN-13(EAN): 9783030223113 Издательство: Springer Рейтинг: Цена: 15372.00 р. Наличие на складе: Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019.
The 26 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on intrusion detection, access control, organizational and behavioral, crypto and encryption, and integrity.
Описание: This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions.
Описание: This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018
.The 29 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are based on both academic research and the professional experience of information practitioners working in the field. They deal with multiple challenges society will be facing in the future and are organized in the following topical sections: history of computing: 'this changed everything'; ICT4D and improvements of ICTs; ICTs and sustainability; gender; ethical and legal considerations; and philosophy.
Want to Keep Your Devices and Networks Safe from Cyberattacks with Just a Few Easy Steps? Read on.
Technology can seem like a blessing or a curse, depending on the circumstances. Giving us extraordinary capabilities that once weren't even imaginable, technology can make life better on all fronts.
On the flip side, maybe you've heard, or even uttered yourself, the frustrating refrain of "great when it works" when your device isn't working quite as it should.
And no doubt, you've heard about the serious problems that viruses and cybercriminals cause for people and their technology.
Cyber attacks are a growing problem that's affecting an increasing number of devices and people.
The current numbers are staggering. Hackers create and deploy over 300 000 new malware programs every single day on networks, individual computers, and other devices. And there are nearly half a million ransomware attacks every year.
Malware threats come in a number of forms, including spyware, viruses, worms, bots, and trojans. Ransomware is a unique scenario where people hold your computer or system for ransom.
The problem is only going to get worse for the simple fact that the number of vulnerabilities is increasing. More and more of your devices are tied into the same network.
Keep in mind, your security is only as strong as your weakest link, and it's doubtful your coffee maker has the same level of protection that your cell phone does.
These prevalent risks include computers, smartphones, voice assistants, email, social media, and public WIFI. There are also some lesser-known risks. For instance, when was the last time you thought about your key fob being hacked?
In this environment, preventative measures can go a long way to protect your devices and avoid costly cleanups.
The problem may seem abstract and far away like it won't happen to you. But unfortunately, hackers don t discriminate organizations from individuals or the other way around when they are looking for their next target.
Most people fall in the common trap of neglecting the danger until it happens to them. By then, the solution has become much more expensive. The average cyberattack cost for a small business is $8,700. In the US, the average cost per lost or stolen records per individual is $225.
The good news is that with a few precautions and prescribed behaviors, you can reduce these risks dramatically. Understanding how to protect yourself against these attacks in the first place is key.
Cyber Security educates you on these threats and clearly walks you through the steps to prevent, detect, and respond to these attacks.
In Cyber Security, you'll discover:
How vulnerable you are right now and how to protect yourself within less than 24h
A simple, straight-forward security framework for preventing, detecting, and responding to attacks
The most damaging but hard to detect attacks and what to do about it
Which unexpected device could be attacked and have life-threatening consequences
Different types of malware and how to handle each effectively
Specific protection actions used by the FBI and CIA that you can take too
Security dangers of popular social media networks, unknown to most users, but regularly exploited by hackers
And much more.
A lot of people resist securing their technology because it can be overwhelming. The key is to keep it simple and manageable with your first foray into security.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru