Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023/ edited by Hind Zantout, Hani Ragab Hassen.
other author:
Zantout, Hind.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
viii, 67 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-40598-3
ISBN:
9783031405983
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
[electronic resource] /edited by Hind Zantout, Hani Ragab Hassen. - Cham :Springer Nature Switzerland :2023. - viii, 67 p. :ill. (some col.), digital ;24 cm. - Lecture notes in networks and systems,7602367-3389 ;. - Lecture notes in networks and systems ;v.1..
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world's attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.
ISBN: 9783031405983
Standard No.: 10.1007/978-3-031-40598-3doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I58 2023
Dewey Class. No.: 005.8
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
LDR
:02348nam a2200325 a 4500
001
1116938
003
DE-He213
005
20230907172615.0
006
m d
007
cr nn 008maaau
008
240124s2023 sz s 0 eng d
020
$a
9783031405983
$q
(electronic bk.)
020
$a
9783031405976
$q
(paper)
024
7
$a
10.1007/978-3-031-40598-3
$2
doi
035
$a
978-3-031-40598-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I58 2023
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2023
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023
$h
[electronic resource] /
$c
edited by Hind Zantout, Hani Ragab Hassen.
260
$a
Cham :
$c
2023.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
viii, 67 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3389 ;
$v
760
520
$a
This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world's attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Artificial intelligence
$x
Security measures
$v
Congresses.
$3
1430481
650
1 4
$a
Data Engineering.
$3
1226308
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Data and Information Security.
$3
1365785
700
1
$a
Zantout, Hind.
$3
1430480
700
1
$a
Ragab Hassen, Hani.
$e
editor.
$3
1401799
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.1.
$3
1107910
856
4 0
$u
https://doi.org/10.1007/978-3-031-40598-3
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login