Arama Sonuçları - "cybersecurity"

Sonuçları Daraltın
  1. 1

    AI in Cybersecurity

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.…”
    Full-text access
    e-Kitap
  2. 2

    Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2016.
    İçindekiler: “…Cybersecurity Interface and Metrics -- Cybersecurity Behavior -- Cybersecurity Situational Awareness for Critical Infrastructure -- Cybersecurity Training -- Cybersecurity Research for Human Effectiveness -- Cybersecurity - Personal Security -- Cybersecurity Tools -- Cultural Factors in Cybersecurity.…”
    Full-text access
    e-Kitap
  3. 3

    Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2017.
    İçindekiler: “…Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges -- Customized Encryption of CAD Models for Cloud-enabled Collaborative Product Development -- A New Approach to Cyberphysical Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized Cyber-physical Systems: A Paradigm for Cloud-based Smart Factory of Industry 4.0 -- Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems -- The Resource Usage Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical Security Aspects of the Internet of Things -- Cybersecurity for Industry 4.0 and Advanced Manufacturing Environments with Ensemble Intelligence.…”
    Full-text access
    e-Kitap
  4. 4

    Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    İçindekiler: “…Cybersecurity management through logging analytics -- Adaptive weak secrets for authenticated key exchange -- Internet of things and distributed denial of service mitigation -- Eye tracking graphical passwords -- Understanding and discovering SQL injection vulnerabilities -- Grid framework to address password memorability issues and offline password attacks -- Exploring 3D cybersecurity visualization with the Microsoft HoloLens -- Humans as the strong link in securing the total learning architecture -- Preserving dignity, maintaining security and acting ethically -- Human factors in information security culture: A literature review -- Do you really trust "privacy policy" or "terms of use" agreements without reading them? …”
    Full-text access
    e-Kitap
  5. 5
  6. 6

    Biometric-Based Physical and Cybersecurity Systems

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    Full-text access
    e-Kitap
  7. 7

    Biologically Inspired Cognitive Architectures (BICA) for Young Scientists Proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity (FIERCES 2017) /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  8. 8

    The NICE Cyber Security Framework Cyber Security Intelligence and Analytics / Yazar: Alsmadi, Izzat

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.…”
    Full-text access
    e-Kitap
  9. 9

    16th International Conference on Information Technology-New Generations (ITNG 2019)

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Networking and Wireless Communications -- Cybersecurity -- Data Mining -- Software Engineering -- High Performance Computing Architectures -- Computer Vision, HCI and Image Processing/Analysis -- Signal Processing, UAVs -- Health, Bioinformatics, Pattern Detection and Optimization -- Education, Applications and Systems -- Short Papers.…”
    Full-text access
    e-Kitap
  10. 10

    Practical Information Security A Competency-Based Education Course / Yazar: Alsmadi, Izzat, Burdwell, Robert, Aleroud , Ahmed, Wahbeh, Abdallah, Al-Qudah, Mahmoud, Al-Omari, Ahmad

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    Full-text access
    e-Kitap
  11. 11

    m_Health Current and Future Applications

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Introduction -- The mHealth -- mHealth market exploitation through the analysis of the related Intellectual Property Rights -- Cybersecurity and the evolutions of healthcare -- Device for mHealth -- Big Data and signal processing in mHealth -- M-health services: examples and future perspectives -- The Healthcare System Perspective in mHealth -- Conclusions.…”
    Full-text access
    e-Kitap
  12. 12

    Applications in Electronics Pervading Industry, Environment and Society APPLEPIES 2018 /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Raspberry Pi 3 Performance Characterization in an Artificial Vision Automotive Application -- Analysis of Cybersecurity Weakness in Automotive In-Vehicle Networking and Hardware Accelerators for Real-time Cryptography -- Testing Facility for the Characterization of the Integration of E-Vehicles into Smart Grid in Presence of Renewable Energy -- On-the-fly Secure Group Communication on CAN Bus -- Neuromuscular Disorders Assessment by FPGA-based SVM Classification of Synchronized EEG/EMG -- Functional Near Infrared Spectroscopy system validation for simultaneous EEG-fNIRS measurements.…”
    Full-text access
    e-Kitap
  13. 13

    Advances in Human Error, Reliability, Resilience, and Performance Proceedings of the AHFE 2018 International Conference on Human Error, Reliability, Resilience, and Performance, Ju...

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Human trust factors in image analysis -- A visual analytics approach to combat confirmation bias for a local food bank -- Study on impact of time load on searching and recognition of visual information -- Analysis of team situation awareness errors in digital nuclear power plants -- Towards enhanced comprehension of human errors in cybersecurity attacks -- Training for readiness and resilience -- Estimating diagnosis time of emergency situations in digitalized control rooms -- Looking for additional data sources for HRA: Microworlds and beyond -- Study on the randomness of EOM behavior in a nuclear power plant. .…”
    Full-text access
    e-Kitap
  14. 14

    Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Introduction -- End to end trust and security for the Internet of Things -- Wise Information Security across the globe -- Secure hardware technology for IoT -- Defense in depth strategies to secure IoT devices -- Safety and security of Cyber Physical Systems -- Securing the endpoints in a connected world -- Securing healthcare devices - The Internet of Biomedical Things -- Protection of the elderly - Elder care robot TIPPSS for IoT -- Process and culture opportunities to address cybersecurity challenges -- Developing the ecosystem for TIPPSS for IoT -- Trust and Identify solutions for IoT -- Privacy and policy implications for IoT -- Blockchain potential to enable TIPPSS for IoT -- Conclusion.…”
    Full-text access
    e-Kitap
  15. 15

    Social Manufacturing: Fundamentals and Applications Yazar: Jiang, Pingyu

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…I: Introduction -- II: Social Manufacturing Paradigm: Architecture and Key Enabled Technologies -- III: Computing and Decision-making in Social Manufacturing -- IV: Social Business Relationship and Organizational Network -- V: Open Product Design for Social Manufacturing -- VI: RFID, Social Sensors and extended Cyber-Physical System -- VII: Social Factory and Inter-connections -- VIII: Product Service Systems for Social Manufacturing -- IX: Block Chain Models for Cybersecurity of Social Manufacturing -- X: Configuration of Social Manufacturing System -- XI: Execution of social manufacturing system -- XII: Industrial Cases for Social Manufacturing.…”
    Full-text access
    e-Kitap
  16. 16

    Information Technology - New Generations 15th International Conference on Information Technology /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    İçindekiler: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    e-Kitap
  17. 17

    Effective Model-Based Systems Engineering Yazar: Borky, John M., Bradley, Thomas H.

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Introduction - Framing the Problem -- Applying Object Orientation to System Architecture -- MBSAP Methodology Overview -- Analyzing Requirements in an Operational Viewpoint -- Designing in a Logical/Functional Viewpoint -- Implementing in a Physical Viewpoint -- Implementing Service-Oriented Architectures for Enterprise Integration -- Extending Architecture to Real-Time Domains -- Developing the Network Dimension -- Protecting Information with Cybersecurity -- Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture -- Using Reference Architectures and Frameworks -- Architecting the Enterprise -- Applying Advanced Concepts -- Implementing Governance to Measure and Maintain Architecture Quality -- Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML) -- Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML) -- Appendix C -- System Architecture Example: E-X AirborneMultisensor Platform -- Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML -- Appendix E - Listing of Information Technology (IT) Core Standards and Sources -- Appendix F - Defense in Depth (DiD) Defintions -- Appendix G - Common Cyber Attack Methods -- Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws -- Appendix I - Software Testing Methods and Tools -- Appendix J - Open System Interconnect (OSI) Layers and Protocols -- Appendix K - Service-Oriented Architecture (SOA) Policy Requirements for Department of Defense (DoD) Programs.…”
    Full-text access
    e-Kitap
  18. 18

    Internet of Things Security and Data Protection

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Internet of Things Cybersecurity Paradigm Shift, Threats Matrix and Practical Taxonomy -- Chapter 2. …”
    Full-text access
    e-Kitap
  19. 19

    Industry 4.0: Managing The Digital Transformation Yazar: Ustundag, Alp, Cevikcan, Emre

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2018.
    İçindekiler: “…Conceptual Framework for Industry 4.0 -- Economic Perspectives for Industry 4.0 Transformation -- Smart Product and Business Models -- Lean and Autonomous Production Systems for Industry 4.0 -- Workforce Transformation with Industry 4.0 Era -- Talent Development for Industry 4.0 -- Assessment for Industry 4.0 Readiness -- Industry 4.0 Roadmap -- Data Analytics for Production and Service Systems -- Internet of Things and New Value Proposition -- The Role of Augmented Reality in the Age of Industry 4.0 -- Adaptive Robotics for Industry 4.0 Ecosystem -- Additive Manufacturing Technologies and its Potentials -- Digital Factory: Simulation for Manufacturing Processes -- Digital Traceability through  Production Value Chain -- Cybersecurity and Industry 4.0.…”
    Full-text access
    e-Kitap
  20. 20

    New Knowledge in Information Systems and Technologies Volume 2 /

    Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.
    İçindekiler: “…Multi-Agent Neural Reinforcement-Learning System with Communication -- Technological Architecture based on Internet of Things to Monitor the Journeys of Artisanal Fishing -- Gesture Based Alternative To Control Recreational UAV -- Automatic Generation of a Sub-optimal Agent Population with Learning -- App Nutrition Label -- Yet Another Virtual Butler to Bridge the Gap Between Users and Ambient Assisted Living -- Usage of HTTPS by Municipal Websites in Portugal -- Cybersecurity Threats Analysis for Airports -- Player Engagement Enhancement with Video Games -- Web-Based Executive Dashboard -- Standardization Issues for the Internet of Things -- An Efficient Sybil Attack Detection for Internet of Things -- Flow Monitoring System for IoT Networks -- Real Time Fuzzy Based Traffic Flow Estimation & Analysis -- Optimized Community Detection in Social Networks -- Usability Evaluation of a Virtual Assistive Companion -- Privacy Preserving kNN Spatial Query with Voronoi Neighbors -- Analysis of Authentication Failures in the Enterprise.…”
    Full-text access
    e-Kitap