feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • TU Berlin  (9)
  • Ibero-Amerik. Institut
  • Kreismedienzentrum Teltow-Fläming
  • SB Forst (Lausitz)
  • Gupta, Brij
  • Licensed  (9)
  • 1
    UID:
    b3kat_BV046325368
    Format: 1 Online-Ressource (xx, 959 Seiten) , Illustrationen, Diagramme (teilweise farbig)
    ISBN: 9783030222772
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-22276-5
    Language: English
    Keywords: Computer ; Netzwerk ; Künstliche Intelligenz ; Datensicherung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hershey PA, USA : Information Science Reference, an imprint of IGI Global
    UID:
    b3kat_BV043860710
    Format: 1 Online-Ressource (xxvi, 589 Seiten) , Illustrationen, Diagramme
    ISBN: 9781522501060
    Series Statement: Advances in information security, privacy, and ethics (AISPE) book series
    Note: E-Book auf der IGI-Global-Plattform für Käufer der Druck-Ausgabe kostenfrei und zeitlich unbegrenzt zugänglich
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-5225-0105-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-5225-0105-3
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Kryptologie
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hershey, PA : IGI Global
    UID:
    b3kat_BV046249441
    Format: 1 Online-Ressource (XVII, 344 Seiten)
    ISBN: 9781799810841
    Additional Edition: Erscheint auch als Druck-Ausgabe, hardcover ISBN 978-1-7998-1082-7
    Additional Edition: Erscheint auch als Druck-Ausgabe, softcover ISBN 978-1-7998-1083-4
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Cloud Computing ; Datensicherung ; Algorithmus
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hershey, PA : IGI Global
    UID:
    b3kat_BV046203737
    Format: 1 Online-Ressource
    ISBN: 9781522597445
    Content: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--
    Note: Unheard story of organizational motivations towards user privacy -- Awanthika Senarath, University of New South Wales, Australia -- Nalin Gamagedara Arachchilage, The University of New South Wales at the Australian Defence Force Academy, Australia -- Securing the cloud for big data -- Michael Robinson, Airbus, United Kingdom -- Kevin Jones, Airbus, United Kingdom -- Human factors in cybersecurity: issues and challenges in big data -- Xichen Zhang, Canadian Institute for Cybersecurity, University of New Brunswick, Canada -- Ali A. Ghorbani, Canadian Institute for Cybersecurity, University of New Brunswick, Canada
    Additional Edition: Erscheint auch als Druck-Ausgabe, hardcover ISBN 978-1-5225-9742-1
    Additional Edition: Erscheint auch als Druck-Ausgabe, softcover ISBN 978-1-5225-9743-8
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Big Data ; Datensicherung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hershey, PA : IGI Global
    UID:
    b3kat_BV046682863
    Format: 1 Online-Ressource
    ISBN: 9781799822431
    Content: "This book explores recent developments and applications in intrusion detection systems and intrusion detection security"--
    Note: Chapter 1. Intelligent user profiling based on sensors and location data to detect intrusions on mobile devices -- Chapter 2. Improved transmission of data and information in intrusion detection environments using the CBEDE methodology -- Chapter 3. Machine learning techniques for intrusion detection -- Chapter 4. Network attack detection with SNMP-MIB using deep neural network -- Chapter 5. A survey on detection and analysis of cyber security threats through monitoring tools -- Chapter 6. Identification and classification of cyber threats through SSH honeypot systems -- Chapter 7. Data access management system in Azure blob storage and AWS s3 multi-cloud storage environments -- Chapter 8. Intrusion detection systems for Internet of Things -- Chapter 9. Internal and external threat analysis of anonymized dataset -- Chapter 10. A comprehensive survey on ddos attacks and recent defense mechanisms -- Chapter 11. A legal framework for healthcare: personal data protection for health law in Turkey -- Chapter 12. Auto fill security solution using biometric authentication for fake profile detection in OSNs -- Chapter 13. An attribute-based searchable encryption scheme for non-monotonic access structure -- Chapter 14. The state-of-the-art cryptography techniques for secure data transmission -- Chapter 15. Cloud computing security: taxonomy of issues, challenges, case studies, and solutions -- Chapter 16. Cybersecurity: an emerging ICS challenge -- Chapter 17. Study of smartcards technology: structure, standards, threats, solutions, and applications
    Additional Edition: Erscheint auch als Druck-Ausgabe, hardcover ISBN 978-1-7998-2242-4
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hershey, PA : IGI Global
    UID:
    b3kat_BV046691164
    Format: 1 Online-Ressource
    ISBN: 9781799827023
    Content: "This book explores recent and future advancements in multimedia security and processing. It also presents new and recent algorithms in various emerging areas for copyright protection, content authentication, ownership authentication, and identity theft"--
    Note: Chapter 1. A review on the technological and literary background of multimedia compression -- Chapter 2. Machine learning as an enabler of continuous and adaptive authentication in multimedia mobile devices -- Chapter 3. Anonymous authentication for privacy preserving of multimedia data in the cloud -- Chapter 4. Robust multimedia watermarking: characteristics, applications, and attacks -- Chapter 5. Defending multimedia content embedded in online social networks (OSNs) using digital watermarking -- Chapter 6. Integer transform-based watermarking scheme for authentication of digital fundus images in medical science: an application to medical image authentication -- Chapter 7. A distributed m-tree for similarity search in large multimedia database on spark -- Chapter 8. The fundamentals of digital forensics -- Chapter 9. Comparative evaluations of human behavior recognition using deep learning -- Chapter 10. Container orchestration with cost-efficient autoscaling in cloud computing environments -- Chapter 11. Gait recognition using deep learning -- Chapter 12. USRP-based secure data transmission -- Chapter 13. Continuous user authentication on touchscreen using behavioral biometrics utilizing machine learning approaches -- Chapter 14. Design and implementation of visual blockchain with Merkle tree -- Chapter 15. Multiple flames recognition using deep learning -- Chapter 16. Network-based detection of mirai botnet using machine learning and feature selection methods -- Chapter 17. The cost perspective of password security
    Additional Edition: Erscheint auch als Druck-Ausgabe, hardcover ISBN 978-1-7998-2701-6
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Hershey, Pennsylvania : IGI Global
    UID:
    b3kat_BV047856053
    Format: 1 Online-Ressource (304 Seiten)
    ISBN: 9781799877912
    Content: "This book describes some of the recent notable advances in threat-detection using machine-learning and artificial-intelligence with a focus on malwares, covering the current trends in ML/statistical approaches to detecting, clustering or classification of cyber-threats extensively
    Note: Includes bibliographical references and index , Chapter 1. Machine learning for malware analysis: methods, challenges, and future directions -- Chapter 2. Research trends for malware and intrusion detection on network systems: a topic modelling approach -- Chapter 3. Deep-learning and machine-learning-based techniques for malware detection and data-driven network security -- Chapter 4. The era of advanced machine learning and deep learning algorithms for malware detection -- Chapter 5. Malware detection in industrial scenarios using machine learning and deep learning techniques -- Chapter 6. Malicious node detection using convolution technique: authentication in wireless sensor networks (WSN) -- Chapter 7. Scalable rekeying using linked LKH algorithm for secure multicast communication -- Chapter 8. Botnet defense system and White-hat worm launch strategy in IoT network -- Chapter 9. A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs) -- Chapter 10. Secbrain: a framework to detect cyberattacks revealing sensitive data in brain-computer interfaces -- Chapter 11. A study on data sharing using blockchain system and its challenges and applications -- Chapter 12. Fruit fly optimization-based adversarial modeling for securing wireless sensor networks (WSN) -- Chapter 13. Cybersecurity risks associated with brain-computer interface classifications. - Mode of access: World Wide Web
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781799877912
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1799877906
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-7998-7790-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1799877892
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781799877899
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1799877892
    Language: English
    Keywords: Malware ; Maschinelles Lernen ; Computerforensik ; Gehirn-Computer-Schnittstelle
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV047856167
    Format: 1 Online-Ressource (XVIII, 313 Seiten)
    ISBN: 9781799884156
    Content: "This book explores the key concepts of data mining and utilizing them on online social media platforms, offering valuable insight into data mining approaches for big data and sentiment analysis in online social media and covering many important security and other aspects and current trends
    Note: Includes bibliographical references and index , Chapter 1. Approaches and applications for sentiment analysis: a literature review -- Chapter 2. A survey on building recommendation systems using data mining techniques -- Chapter 3. A survey on sentiment analysis techniques for Twitter -- Chapter 4. Role of social media in the COVID-19 pandemic: a literature review -- Chapter 5. Data mining approaches for sentiment analysis in online social networks (OSNs) -- Chapter 6. Sentiment analysis and summarization of Facebook posts on news media -- Chapter 7. An improved cross-domain sentiment analysis based on a semi-supervised convolutional neural network -- Chapter 8. Detection of economy-related Turkish tweets based on machine learning approaches -- Chapter 9. The stakes of social media: analyzing user sentiments -- Chapter 10. Predicting catastrophic events using machine learning models for natural language processing -- Chapter 11. Clubhouse experience: sentiment analysis of an alternative platform from the eyes of classic social media users. - Mode of access: World Wide Web
    Additional Edition: Erscheint auch als Druck-Ausgabe, hbk ISBN 978-1-79988-413-2
    Additional Edition: Erscheint auch als Druck-Ausgabe, pbk ISBN 978-1-79988-414-9
    Language: English
    Keywords: Social Media ; Data Mining ; Big Data ; Stimmungsbild
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV048933672
    Format: 1 Online-Ressource (xlii, 387 Seiten)
    ISBN: 9781668441039
    Series Statement: Advances in human and social aspects of technology (AHSAT) book series
    Content: This book helps readers argue the business rationale of digitalization, introducing the agile operating model that has triggered digital transformation and the plethora of ways it has become of practical use in every country
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1668441020
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781668441022
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1668441020
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Pettinger, Richard
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages