The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, PDF)
Redaktion: Jabbar, M. A.; Huang, Stephen; Pani, Subhendu Kumar; Tiwari, Sanju
137,95 €
137,95 €
inkl. MwSt.
Sofort per Download lieferbar
69 °P sammeln
137,95 €
Als Download kaufen
137,95 €
inkl. MwSt.
Sofort per Download lieferbar
69 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
137,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
69 °P sammeln
The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, PDF)
Redaktion: Jabbar, M. A.; Huang, Stephen; Pani, Subhendu Kumar; Tiwari, Sanju
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Discussess advances in artificial intelligence and soft computing techniques in cybersecurity. It looks at the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, cybersecurity for cyber-physical systems, edge computing, machine learning, neural gas clustering technique, etc.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.7MB
Andere Kunden interessierten sich auch für
- The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, ePUB)137,95 €
- Ishaani PriyadarshiniCybersecurity (eBook, PDF)130,95 €
- Bruce MiddletonCyber Crime Investigator's Field Guide (eBook, PDF)59,95 €
- Ishaani PriyadarshiniCybersecurity (eBook, ePUB)130,95 €
- Cyber-Physical Systems and Industry 4.0 (eBook, PDF)122,95 €
- Bruce MiddletonCyber Crime Investigator's Field Guide (eBook, ePUB)59,95 €
- AI Based Advancements in Biometrics and its Applications (eBook, PDF)52,95 €
-
-
-
Discussess advances in artificial intelligence and soft computing techniques in cybersecurity. It looks at the use of cybersecurity for cloud intelligent systems, applications of cybersecurity techniques for web applications, cybersecurity for cyber-physical systems, edge computing, machine learning, neural gas clustering technique, etc.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 294
- Erscheinungstermin: 28. Juni 2024
- Englisch
- ISBN-13: 9781000925418
- Artikelnr.: 70072417
- Verlag: Taylor & Francis
- Seitenzahl: 294
- Erscheinungstermin: 28. Juni 2024
- Englisch
- ISBN-13: 9781000925418
- Artikelnr.: 70072417
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
M. A. Jabbar, PhD, is a Professor and Head of the Department of Computer and Science Engineering (AI & ML), Vardhaman College of Engineering India. He has been teaching for more than 20 years. He has published over 60 papers in journals and conferences and served as a technical committee member for over 70 international conferences. He has co-edited several books and has also been editor for several conferences and has been involved as an organizing chair, program committee chair, publication chair, and reviewer. Sanju Tiwari, PhD, is a Senior Researcher at the Universidad Autonoma de Tamaulipas, Mexico. She has worked as a postdoctoral researcher in the Ontology Engineering Group at the Universidad Polytecnica De Madrid, Spain, and as a research associate for a sponsored research project funded by the Defence Research and Development Organisation, India, where she developed and evaluated a decision support system for Indian defence. Subhendu Kumar Pani, PhD, is Professor in the Department of Computer Science and Engineering and Research Coordinator, Krupajal Engineering College, India. He was formerly Professor in the Department of Computer Science and Engineering and Research Coordinator at Orissa Engineering College, India. He has more than 100 international publications, five authored books, two edited books, and ten book chapters to his credit. His professional activities include roles such as associate editor, editorial board member, and/or reviewer for various international journals. He is associated with a number of conferences and societies. Stephen Huang, PhD, is Professor of Computer Science at the University of Houston, Texas, USA, where he also serves as the Director of Research at the Center for Information Security Research and Education. He has published many journals and conference papers and has supervised and graduated many MSc and PhD students. Dr. Huang served in several administrative positions at UH, including Director of Graduate Studies, Associate Chairman, and Department Chairman. He was a National Research Council-NASA Senior Research Associate at the NASA Goddard Space Flight Center, Greenbelt, Maryland, during 1989-90.
PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review
Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the
COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and
Challenges During a Pandemic 4. Mobile App Development Privacy and Security
Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT
SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence
and Soft Computing Techniques 6. Security in IoT Using Artificial
Intelligence 7. Cybersecurity for Intelligent Systems PART III:
APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis
of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting
in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical
Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic
Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient
Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized
Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas
(GNG) Clustering Technique 13. Security in IoT: Systematic Review