Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9781000347111 , 9781003107378
    Language: English
    Pages: 1 Online-Ressource (xv, 104 Seiten)
    Edition: First edition
    Parallel Title: Erscheint auch als
    DDC: 302.231028558
    Keywords: Online social networks-Security measures ; Computer security ; Electronic books ; Electronic books.
    Abstract: Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgements -- About the Authors -- 1. Overview of OSNs and Their Impacts on Users -- 1.1. Online Social Network Vulnerabilities -- 1.1.1. Fundamentals of Online Social Networks -- 1.2. Functional Parameters of Online Social Network -- 1.3. Interaction Among Service Providers and Its Users -- 1.4. Background and Motivation -- 1.5. Statistical Analysis Based on Usage and Others -- 1.6. Various Categories of Online Social Networks -- 1.7. Rapid Growth of Social Network Environment -- 1.8. Usage of Online Social Networks Based on Requirement -- 1.9. Online Social Network Issues and Impact -- 1.10. Difficulties in Detection and Mitigation of Various Attacks Against OSNs -- 1.11. Chapter Summary -- References -- 2. Security Challenges in Social Networking: Taxonomy, Statistics, and Opportunities -- 2.1. The Dark Side of Online Social Networks and Media -- 2.2. Mistakes and Wrong Responses by the People -- 2.3. Once It's Out: It's Out -- 2.4. Various Opportunities in OSNs -- 2.5. Taxonomy of OSN-Based Attacks -- 2.5.1. Advanced Persistent Threats -- 2.5.2. Classical Threats -- 2.5.3. Social Threats -- 2.6. Taxonomy of Various Solutions Against OSN Attacks -- 2.6.1. In-Built Security Solution -- 2.6.2. Third-Party Software Solutions -- 2.6.3. Other Security Solutions Against OSN Attacks -- 2.7. Chapter Summary -- References -- 3. Fundamentals of Online Social Networks (OSNs) and Opportunities -- 3.1. Opportunities in Social Media -- 3.2. Branding -- 3.3. Building of Social Authority in Social Platform -- 3.4. Customers' Engagement -- 3.5. Sending the Word Out -- 3.6. What to Say? and What Not to? -- 3.7. Cobras (Consumer Brand-Related Activity) -- 3.8. Hashtag -- 3.9. Mistake in Replying to Users of Social Network -- 3.10. Collective Intelligence.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783030967376
    Language: English
    Pages: 1 Online-Ressource(VIII, 262 p. 138 illus., 96 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Studies in Computational Intelligence 1030
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Computational intelligence. ; Control engineering. ; Robotics. ; Automation. ; Artificial intelligence.
    Abstract: Deep Learning in Robotics for strengthening Industry 4.0.: Opportunities, Challenges and Future Directions -- The Design of a Pheromone-based Robotic Varroa Trap for Beekeeping Applications -- Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey -- Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities -- Privacy & Security Concerns in Edge Computing-based Smart Cities -- A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN) -- Developing instrument for investigation of blockchain technology -- An IoT-based system for expert user supporting to monitor, manage and protect Cultural Heritage Buildings -- Commercialising Blockchain in a Smart City: Autonomous Vehicles, Cryptocurrency, and Contract Law -- Finding all shortest meaningful meta-paths between two vertices of a Secured Large Heterogeneous Information Network using distributed algorithm -- Creation of a Dataset Modeling the Behavior of Malware Affecting the Confidentiality of Data Managed by IoT Devices -- Anomaly Detection on Static and Dynamic Graphs using Graph Convolutional Neural Network -- Secure Medical Data sharing through Blockchain and Decentralized Models. .
    Abstract: This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783030854287
    Language: English
    Pages: 1 Online-Ressource(XI, 278 p. 101 illus., 76 illus. in color.)
    Edition: 1st ed. 2022.
    Series Statement: Studies in Big Data 95
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Engineering—Data processing. ; Cooperating objects (Computer systems). ; Computational intelligence. ; Big data.
    Abstract: Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks -- Data Security Challenges in Deep Neural Network for Healthcare IoT Systems -- Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio -- A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals -- Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems -- Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches.
    Abstract: This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781003230113 , 1003230113 , 9781000901504 , 1000901505 , 9781000901559 , 1000901556
    Language: English
    Pages: 1 online resource
    Edition: First edition.
    Parallel Title: Erscheint auch als
    Keywords: Integrated circuits Design and construction ; Data processing ; Security measures ; Artificial intelligence Industrial applications ; Big data ; COMPUTERS / Networking / Security ; COMPUTERS / Artificial Intelligence ; COMPUTERS / Data Processing / General
    Abstract: "Artificial Intelligence, machine learning and advanced electronic circuits are learning from every data input and using those inputs to generate new rules for future business analytics. Artificial Intelligence and Machine Learning are now giving us new opportunities to use the big data that we already had, as well as unleash a whole lot of new use cases with new data types. With the increasing use of Artificial Intelligence dealing with highly sensitive information such as health care, adequate security measures are required to be taken for the secure storage and transmission. AI for Big data based Engineering applications from security perspectives provide broader coverage of the basic aspects of advanced circuits design and applications. The book AI for Big data based Engineering applications from security perspectives is an integrated source which aims at understanding the basic concepts associated with the security of the advanced circuits. The content includes theoretical frameworks and recent empirical findings in the field to understand the associated principles, key challenges and recent real-time applications of the advanced circuits, AI and Big data security. It illustrates the notions, models and terminologies that are widely used in the area of VLSI circuits, security, identifies the existing security issues in the field, and evaluates the underlying factors that influence the security of the systems. It emphasizes the idea of understanding the motivation of the advanced circuits' design to establish the AI interface and to mitigate the security attacks in a better way for big data. This book also outlines the exciting areas of future research where the already existing methodologies can be implemented. Moreover, this book is suitable for students, researchers, and professionals who are looking forward to carry out research in the field of AI for Big data based Engineering applications from security perspectives, faculty members across the universities and software developers"--
    Note: Includes bibliographical references. - Description based on print version record and CIP data provided by publisher ; resource not viewed
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781668441039
    Language: English
    Pages: 1 Online-Ressource(23 PDFs (387 pages))
    Parallel Title: Erscheint auch als
    DDC: 303.48/33
    Keywords: Information technology Economic aspects ; Information technology Social aspects
    Abstract: "This book helps readers argue the business rationale of digitalization, introducing the agile operating model that has triggered digital transformation and the plethora of ways it has become of practical use in every country"--
    Note: Includes bibliographical references and index. - Description based on title screen (IGI Global, viewed 03/10/2023) , Mode of access: World Wide Web.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...