Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021/ edited by Hani Ragab Hassen, Hadj Batatia.
other author:
Ragab Hassen, Hani.
Description:
X, 143 p. 45 illus., 29 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computational intelligence. -
Online resource:
https://doi.org/10.1007/978-3-030-95918-0
ISBN:
9783030959180
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
[electronic resource] /edited by Hani Ragab Hassen, Hadj Batatia. - 1st ed. 2022. - X, 143 p. 45 illus., 29 illus. in color.online resource. - Lecture Notes in Networks and Systems,3782367-3389 ;. - Lecture Notes in Networks and Systems,1.
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
ISBN: 9783030959180
Standard No.: 10.1007/978-3-030-95918-0doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
LDR
:02416nam a22003855i 4500
001
1093806
003
DE-He213
005
20220201121951.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030959180
$9
978-3-030-95918-0
024
7
$a
10.1007/978-3-030-95918-0
$2
doi
035
$a
978-3-030-95918-0
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021
$h
[electronic resource] /
$c
edited by Hani Ragab Hassen, Hadj Batatia.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
X, 143 p. 45 illus., 29 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes in Networks and Systems,
$x
2367-3389 ;
$v
378
520
$a
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
700
1
$a
Ragab Hassen, Hani.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1401799
700
1
$a
Batatia, Hadj.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1162025
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030959173
776
0 8
$i
Printed edition:
$z
9783030959197
830
0
$a
Lecture Notes in Networks and Systems,
$x
2367-3370 ;
$v
1
$3
1267315
856
4 0
$u
https://doi.org/10.1007/978-3-030-95918-0
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login