Illumination of Artificial Intelligence in Cybersecurity and Forensics
No Customer Reviews
A Practical Experience Applying Security Audit Techniques in an Industrial Healthcare System.- Feature Extraction and Artificial Intelligence-Based Intrusion Detection Model for a Secure Internet of Things Networks.- Intrusion Detection using Anomaly Detection Algorithm and Snort.- Research Perspective on Digital Forensic Tools and Investigation Process.- Intelligent Authentication Framework for Internet of Medical Things (IoMT).- Parallel Faces Recognition Attendance System with Anti-spoofing using Convolutional Neural Network.- A Systematic Literature Review on Face Morphing Attack Detection (MAD).- Averaging Dimensionality Reduction and Feature Level Fusion for Post-Processed Morphed Face Image Attack Detection.- A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain.- Predictive Forensic Based - Characterization of Hidden Elements in Criminal Networks using Baum-Welch Optimization Technique.- An Integrated IDS using ICA-based Feature Selection and SVM Classification Method.- A Binary Firefly Algorithm Based Feature Selection Method on High Dimensional Intrusion Detection Data.- Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System.- Authenticated Encryption to Prevent Cyberattacks in images.- Machine Learning in Automated Detection of Ransomware: Scope, Benefits and Challenges.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.