Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Illumination of Artificial Intelligence in Cybersecurity and Forensics
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Illumination of Artificial Intelligence in Cybersecurity and Forensics/ edited by Sanjay Misra, Chamundeswari Arumugam.
other author:
Misra, Sanjay.
Description:
XV, 372 p. 115 illus., 86 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Engineering—Data processing. -
Online resource:
https://doi.org/10.1007/978-3-030-93453-8
ISBN:
9783030934538
Illumination of Artificial Intelligence in Cybersecurity and Forensics
Illumination of Artificial Intelligence in Cybersecurity and Forensics
[electronic resource] /edited by Sanjay Misra, Chamundeswari Arumugam. - 1st ed. 2022. - XV, 372 p. 115 illus., 86 illus. in color.online resource. - Lecture Notes on Data Engineering and Communications Technologies,1092367-4520 ;. - Lecture Notes on Data Engineering and Communications Technologies,3.
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System -- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research Perspective on Digital Forensic Tools and Investigation Process -- Intelligent Authentication Framework for Internet of Medical Things (IoMT) -- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network -- A Systematic Literature Review on Face Morphing Attack Detection (MAD) -- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection -- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain -- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique -- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method -- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data -- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System -- Authenticated Encryption to Prevent Cyberattacks in images -- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
ISBN: 9783030934538
Standard No.: 10.1007/978-3-030-93453-8doiSubjects--Topical Terms:
1297966
Engineering—Data processing.
LC Class. No.: TA345-345.5
Dewey Class. No.: 620.00285
Illumination of Artificial Intelligence in Cybersecurity and Forensics
LDR
:04089nam a22003975i 4500
001
1094066
003
DE-He213
005
20220208061053.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030934538
$9
978-3-030-93453-8
024
7
$a
10.1007/978-3-030-93453-8
$2
doi
035
$a
978-3-030-93453-8
050
4
$a
TA345-345.5
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
620.00285
$2
23
245
1 0
$a
Illumination of Artificial Intelligence in Cybersecurity and Forensics
$h
[electronic resource] /
$c
edited by Sanjay Misra, Chamundeswari Arumugam.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XV, 372 p. 115 illus., 86 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4520 ;
$v
109
505
0
$a
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System -- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks -- Intrusion Detection using Anomaly Detection Algorithm and Snort -- Research Perspective on Digital Forensic Tools and Investigation Process -- Intelligent Authentication Framework for Internet of Medical Things (IoMT) -- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network -- A Systematic Literature Review on Face Morphing Attack Detection (MAD) -- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection -- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain -- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique -- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method -- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data -- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System -- Authenticated Encryption to Prevent Cyberattacks in images -- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
520
$a
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum–Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection. It assists the reader in exploring new research areas, wherein AI can be applied to offer solutions through the contribution from researchers and academia.
650
0
$a
Engineering—Data processing.
$3
1297966
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Data protection.
$3
557764
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Misra, Sanjay.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1210240
700
1
$a
Arumugam, Chamundeswari.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1402124
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030934521
776
0 8
$i
Printed edition:
$z
9783030934545
830
0
$a
Lecture Notes on Data Engineering and Communications Technologies,
$x
2367-4512 ;
$v
3
$3
1279482
856
4 0
$u
https://doi.org/10.1007/978-3-030-93453-8
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login