Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research, Rani Panigrahi, Chhabi ; de Albuquerque, Victor Hu
Автор: Maosong Sun, Xiaojie Wang, Baobao Chang Название: Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data ISBN: 3319690043 ISBN-13(EAN): 9783319690049 Издательство: Springer Рейтинг: Цена: 5300.00 р. Наличие на складе: Есть (3 шт.) Описание: This book constitutes the proceedings of the 16th China National Conference on Computational Linguistics, CCL 2017, and the 5th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2017, held in Nanjing, China, in October 2017. Minority language information processing.
Автор: Anil Kumar Sagar et al. Название: Artificial intelligence in cyber physical systems : ISBN: 1032164832 ISBN-13(EAN): 9781032164830 Издательство: Taylor&Francis Рейтинг: Цена: 19906.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents the combination of artificial intelligence blended with the Internet of Things (IoT) and its applications in cyber-physical systems. It will be useful for graduate students and academic researchers in diverse fields of engineering including electrical, electronics, computer, and information technology.
Описание: Evolving technological advancements in big data, smartphone and mobile software applications, the Internet of Things and a vast range of application areas in all sorts of human activities and professions, lead current research toward the efficient incorporation of artificial intelligence enhancements into software and the empowerment of software with artificial intelligence. The book at hand, devoted to Smart Software Applications in Cyber-Physical Systems, constitutes the second volume of a two-volume Handbook on Artificial Intelligence-empowered Applied Software Engineering. Topics include very significant advances in Smart Software Applications in (i) Scientific Document Processing, (ii) Enterprise Modeling, (iii) Education, (iv) Health care and Medicine, and (v) Infrastructure Monitoring. Professors, researchers, scientists, engineers, and students in artificial intelligence, software engineering, and computer science-related disciplines are expected to benefit from it, along with interested readers from other disciplines.
Автор: Vijayalakshmi, S ; Durgadevi, P ; Jacob, Lija ; Ba Название: Artificial Intelligence for Cyber Defense and Smart Policing ISBN: 103217093X ISBN-13(EAN): 9781032170930 Издательство: Taylor&Francis Рейтинг: Цена: 18374.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Authored by a range of international experts, this book brings us closer to the responses for the questions like how may AI be used /or is a threat for PRME implementation, how will AI impact the business education world or what we should teach in business school in the time of AI (what the`right` set of future skills is)?
Название: Cyber Crime and Forensic Computing ISBN: 3110677377 ISBN-13(EAN): 9783110677379 Издательство: Walter de Gruyter Рейтинг: Цена: 39966.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently.
Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law.
Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations.
On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime.
Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
Автор: Arabnia Hamid R., Daimi Kevin, Stahlbock Robert Название: Principles of Data Science ISBN: 3030439801 ISBN-13(EAN): 9783030439804 Издательство: Springer Рейтинг: Цена: 22359.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Introduction.- Data Acquisition, Extraction, and Cleaning.- Data Summarization and Modeling.- Data Analysis and Communication Techniques.- Data Science Tools.- Deep Learning in Data Science.- Data Science Applications.- Conclusion.
Автор: Jan Komorowski; Jan Zytkow Название: Principles of Data Mining and Knowledge Discovery ISBN: 3540632239 ISBN-13(EAN): 9783540632238 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the First European Symposium on Principles of Data Mining and Knowledge Discovery, PKDD `97, held in Trondheim, Norway, in June 1997.The volume presents a total of 38 revised full papers together with abstracts of one invited talk and four tutorials.
Автор: Tapio Elomaa; Heikki Mannila; Hannu Toivonen Название: Principles of Data Mining and Knowledge Discovery ISBN: 3540440372 ISBN-13(EAN): 9783540440376 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery held in Finland in 2002. Papers cover kernel methods, probabilistic methods, association rule mining, rough sets, sampling algorithms, pattern discovery, web text mining and more.
Автор: Jan M. Zytkow; Mohamed Quafafou Название: Principles of Data Mining and Knowledge Discovery ISBN: 3540650687 ISBN-13(EAN): 9783540650683 Издательство: Springer Рейтинг: Цена: 12577.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The refereed proceedings of the Second European Symposium on Principles of Data Mining and Knowledge Discovery. There are 26 revised papers and 30 poster presentations organized in topical sections, including rule evaluation, visualization, association rules and text mining, and tree construction.
Автор: Jan Zytkow; Jan Rauch Название: Principles of Data Mining and Knowledge Discovery ISBN: 3540664904 ISBN-13(EAN): 9783540664901 Издательство: Springer Рейтинг: Цена: 14673.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the Third European Conference on Principles and Practice of Knowledge Discovery in Databases, PKDD`99, held in Prague, Czech Republic in September 1999.The 28 revised full papers and 48 poster presentations were carefully reviewed and selected from 106 full papers submitted.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru