語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023/ edited by Hind Zantout, Hani Ragab Hassen.
其他作者:
Ragab Hassen, Hani.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
viii, 67 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-3-031-40598-3
ISBN:
9783031405983
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
[electronic resource] /edited by Hind Zantout, Hani Ragab Hassen. - Cham :Springer Nature Switzerland :2023. - viii, 67 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,7602367-3389 ;. - Lecture notes in networks and systems ;v.1..
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world's attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.
ISBN: 9783031405983
Standard No.: 10.1007/978-3-031-40598-3doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25 / I58 2023
Dewey Class. No.: 005.8
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
LDR
:02348nam a2200325 a 4500
001
1116938
003
DE-He213
005
20230907172615.0
006
m d
007
cr nn 008maaau
008
240124s2023 sz s 0 eng d
020
$a
9783031405983
$q
(electronic bk.)
020
$a
9783031405976
$q
(paper)
024
7
$a
10.1007/978-3-031-40598-3
$2
doi
035
$a
978-3-031-40598-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2023
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2023
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
$h
[electronic resource] /
$c
edited by Hind Zantout, Hani Ragab Hassen.
260
$a
Cham :
$c
2023.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
viii, 67 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
760
520
$a
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world's attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Computational Intelligence.
$3
768837
650
1 4
$a
Data Engineering.
$3
1226308
650
0
$a
Artificial intelligence
$x
Security measures
$v
Congresses.
$3
1430481
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
700
1
$a
Ragab Hassen, Hani.
$e
editor.
$3
1401799
700
1
$a
Zantout, Hind.
$3
1430480
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-3-031-40598-3
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入