Buch, Englisch, 294 Seiten, Format (B × H): 152 mm x 229 mm, Gewicht: 562 g
Buch, Englisch, 294 Seiten, Format (B × H): 152 mm x 229 mm, Gewicht: 562 g
Reihe: AAP Advances in Artificial Intelligence and Robotics
ISBN: 978-1-77491-480-9
Verlag: Apple Academic Press
Zielgruppe
Academic and Postgraduate
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
- Naturwissenschaften Biowissenschaften Biowissenschaften
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
Weitere Infos & Material
PART I: CYBERSECURITY DURING COVID-19 PANDEMIC 1. An Insight into Cybersecurity During the COVID-19 Pandemic 2. Cyberattack Surges in the COVID-19 Scenario: Reasons and Consequences 3. IoT in Security: Impact and Challenges During a Pandemic 4. Mobile App Development Privacy and Security Checklist During COVID-19 PART II: CYBERSECURITY FOR CLOUD INTELLIGENT SYSTEMS 5. Cloud and Edge Computing Security Using Artificial Intelligence and Soft Computing Techniques 6. Security in IoT Using Artificial Intelligence 7. Cybersecurity for Intelligent Systems PART III: APPLICATIONS OF CYBERSECURITY TECHNIQUES FOR WEB APPLICATIONS 8. Analysis of Advanced Manual Detection and Robust Prevention of Cross-Site Scripting in Web-Based Services 9. Soft Computing Techniques for Cyber-Physical Systems 10. Cyber Security Using Machine Learning Approaches: A Systematic Review PART IV: CYBERSECURITY FOR CYBER-PHYSICAL SYSTEMS 11. Efficient Vehicle-Tracking System in Dense Traffic to Enhance Security 12. Optimized Analysis of Network Forensic Attacks Using Enhanced Growing Neural Gas (GNG) Clustering Technique 13. Security in IoT: Systematic Review