Search Results - "cybersecurity"

Refine Results
  1. 1

    AI in Cybersecurity

    Published 2019
    Table of Contents: “…OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.…”
    Full-text access
    View in OPAC
    e-Book
  2. 2

    Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing /

    Published 2017
    Table of Contents: “…Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges -- Customized Encryption of CAD Models for Cloud-enabled Collaborative Product Development -- A New Approach to Cyberphysical Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized Cyber-physical Systems: A Paradigm for Cloud-based Smart Factory of Industry 4.0 -- Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems -- The Resource Usage Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical Security Aspects of the Internet of Things -- Cybersecurity for Industry 4.0 and Advanced Manufacturing Environments with Ensemble Intelligence.…”
    Full-text access
    View in OPAC
    e-Book
  3. 3

    Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA /

    Published 2018
    Table of Contents: “…Cybersecurity management through logging analytics -- Adaptive weak secrets for authenticated key exchange -- Internet of things and distributed denial of service mitigation -- Eye tracking graphical passwords -- Understanding and discovering SQL injection vulnerabilities -- Grid framework to address password memorability issues and offline password attacks -- Exploring 3D cybersecurity visualization with the Microsoft HoloLens -- Humans as the strong link in securing the total learning architecture -- Preserving dignity, maintaining security and acting ethically -- Human factors in information security culture: A literature review -- Do you really trust "privacy policy" or "terms of use" agreements without reading them? …”
    Full-text access
    View in OPAC
    e-Book
  4. 4

    Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA /

    Published 2016
    Table of Contents: “…Cybersecurity Interface and Metrics -- Cybersecurity Behavior -- Cybersecurity Situational Awareness for Critical Infrastructure -- Cybersecurity Training -- Cybersecurity Research for Human Effectiveness -- Cybersecurity - Personal Security -- Cybersecurity Tools -- Cultural Factors in Cybersecurity.…”
    Full-text access
    View in OPAC
    e-Book
  5. 5
  6. 6

    Biometric-Based Physical and Cybersecurity Systems

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  7. 7
  8. 8

    Siber güvenlik ve siber savaş / by Singer, Peter

    Published 2015
    “…Cybersecurity and cyberwar : what everyone needs to know…”
    View in OPAC
    Book
  9. 9

    The NICE Cyber Security Framework Cyber Security Intelligence and Analytics / by Alsmadi, Izzat

    Published 2019
    Table of Contents: “…Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.…”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    16th International Conference on Information Technology-New Generations (ITNG 2019)

    Published 2019
    Table of Contents: “…Networking and Wireless Communications -- Cybersecurity -- Data Mining -- Software Engineering -- High Performance Computing Architectures -- Computer Vision, HCI and Image Processing/Analysis -- Signal Processing, UAVs -- Health, Bioinformatics, Pattern Detection and Optimization -- Education, Applications and Systems -- Short Papers.…”
    Full-text access
    View in OPAC
    e-Book
  11. 11
  12. 12

    m_Health Current and Future Applications

    Published 2019
    Table of Contents: “…Introduction -- The mHealth -- mHealth market exploitation through the analysis of the related Intellectual Property Rights -- Cybersecurity and the evolutions of healthcare -- Device for mHealth -- Big Data and signal processing in mHealth -- M-health services: examples and future perspectives -- The Healthcare System Perspective in mHealth -- Conclusions.…”
    Full-text access
    View in OPAC
    e-Book
  13. 13

    Applications in Electronics Pervading Industry, Environment and Society APPLEPIES 2018 /

    Published 2019
    Table of Contents: “…Raspberry Pi 3 Performance Characterization in an Artificial Vision Automotive Application -- Analysis of Cybersecurity Weakness in Automotive In-Vehicle Networking and Hardware Accelerators for Real-time Cryptography -- Testing Facility for the Characterization of the Integration of E-Vehicles into Smart Grid in Presence of Renewable Energy -- On-the-fly Secure Group Communication on CAN Bus -- Neuromuscular Disorders Assessment by FPGA-based SVM Classification of Synchronized EEG/EMG -- Functional Near Infrared Spectroscopy system validation for simultaneous EEG-fNIRS measurements.…”
    Full-text access
    View in OPAC
    e-Book
  14. 14

    Advances in Human Error, Reliability, Resilience, and Performance Proceedings of the AHFE 2018 International Conference on Human Error, Reliability, Resilience, and Performance, Ju...

    Published 2019
    Table of Contents: “…Human trust factors in image analysis -- A visual analytics approach to combat confirmation bias for a local food bank -- Study on impact of time load on searching and recognition of visual information -- Analysis of team situation awareness errors in digital nuclear power plants -- Towards enhanced comprehension of human errors in cybersecurity attacks -- Training for readiness and resilience -- Estimating diagnosis time of emergency situations in digitalized control rooms -- Looking for additional data sources for HRA: Microworlds and beyond -- Study on the randomness of EOM behavior in a nuclear power plant. .…”
    Full-text access
    View in OPAC
    e-Book
  15. 15

    Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things /

    Published 2019
    Table of Contents: “…Introduction -- End to end trust and security for the Internet of Things -- Wise Information Security across the globe -- Secure hardware technology for IoT -- Defense in depth strategies to secure IoT devices -- Safety and security of Cyber Physical Systems -- Securing the endpoints in a connected world -- Securing healthcare devices - The Internet of Biomedical Things -- Protection of the elderly - Elder care robot TIPPSS for IoT -- Process and culture opportunities to address cybersecurity challenges -- Developing the ecosystem for TIPPSS for IoT -- Trust and Identify solutions for IoT -- Privacy and policy implications for IoT -- Blockchain potential to enable TIPPSS for IoT -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  16. 16

    Social Manufacturing: Fundamentals and Applications by Jiang, Pingyu

    Published 2019
    Table of Contents: “…I: Introduction -- II: Social Manufacturing Paradigm: Architecture and Key Enabled Technologies -- III: Computing and Decision-making in Social Manufacturing -- IV: Social Business Relationship and Organizational Network -- V: Open Product Design for Social Manufacturing -- VI: RFID, Social Sensors and extended Cyber-Physical System -- VII: Social Factory and Inter-connections -- VIII: Product Service Systems for Social Manufacturing -- IX: Block Chain Models for Cybersecurity of Social Manufacturing -- X: Configuration of Social Manufacturing System -- XI: Execution of social manufacturing system -- XII: Industrial Cases for Social Manufacturing.…”
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Information Technology - New Generations 15th International Conference on Information Technology /

    Published 2018
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Effective Model-Based Systems Engineering by Borky, John M., Bradley, Thomas H.

    Published 2019
    Table of Contents: “…Introduction - Framing the Problem -- Applying Object Orientation to System Architecture -- MBSAP Methodology Overview -- Analyzing Requirements in an Operational Viewpoint -- Designing in a Logical/Functional Viewpoint -- Implementing in a Physical Viewpoint -- Implementing Service-Oriented Architectures for Enterprise Integration -- Extending Architecture to Real-Time Domains -- Developing the Network Dimension -- Protecting Information with Cybersecurity -- Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture -- Using Reference Architectures and Frameworks -- Architecting the Enterprise -- Applying Advanced Concepts -- Implementing Governance to Measure and Maintain Architecture Quality -- Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML) -- Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML) -- Appendix C -- System Architecture Example: E-X AirborneMultisensor Platform -- Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML -- Appendix E - Listing of Information Technology (IT) Core Standards and Sources -- Appendix F - Defense in Depth (DiD) Defintions -- Appendix G - Common Cyber Attack Methods -- Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws -- Appendix I - Software Testing Methods and Tools -- Appendix J - Open System Interconnect (OSI) Layers and Protocols -- Appendix K - Service-Oriented Architecture (SOA) Policy Requirements for Department of Defense (DoD) Programs.…”
    Full-text access
    View in OPAC
    e-Book
  19. 19

    Internet of Things Security and Data Protection

    Published 2019
    Table of Contents: “…Internet of Things Cybersecurity Paradigm Shift, Threats Matrix and Practical Taxonomy -- Chapter 2. …”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Industry 4.0: Managing The Digital Transformation by Ustundag, Alp, Cevikcan, Emre

    Published 2018
    Table of Contents: “…Conceptual Framework for Industry 4.0 -- Economic Perspectives for Industry 4.0 Transformation -- Smart Product and Business Models -- Lean and Autonomous Production Systems for Industry 4.0 -- Workforce Transformation with Industry 4.0 Era -- Talent Development for Industry 4.0 -- Assessment for Industry 4.0 Readiness -- Industry 4.0 Roadmap -- Data Analytics for Production and Service Systems -- Internet of Things and New Value Proposition -- The Role of Augmented Reality in the Age of Industry 4.0 -- Adaptive Robotics for Industry 4.0 Ecosystem -- Additive Manufacturing Technologies and its Potentials -- Digital Factory: Simulation for Manufacturing Processes -- Digital Traceability through  Production Value Chain -- Cybersecurity and Industry 4.0.…”
    Full-text access
    View in OPAC
    e-Book