Card | Table | RUSMARC | |
Artificial intelligence and security challenges in emerging networks / Ryma Abassi, editor. — 1 online resource. — <URL:http://elib.fa.ru/ebsco/1996428.pdf>.Record create date: 1/10/2019 Subject: Computer networks — Security measures.; Internet — Security measures.; Malware (Computer software); Artificial intelligence.; Artificial intelligence.; Computer networks — Security measures.; Internet — Security measures.; Malware (Computer software); COMPUTERS / General Collections: EBSCO Allowed Actions: –
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
Group: Anonymous Network: Internet |
Annotation
"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc. It also examines the applications of artificial intelligence (AI), machine learning, and data mining to security and privacy problems"--.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All | |||||
Internet | Readers | |||||
Internet | Anonymous |
Table of Contents
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- Table of Contents
- Detailed Table of Contents
- Preface
- Acknowledgment
- Chapter 1: The Age of Ransomware
- Chapter 2: A Review of Security Mechanisms for Multi-Agent Systems
- Chapter 3: Attack Detection in Cloud Networks Based on Artificial Intelligence Approaches
- Chapter 4: Network Manipulation Using Network Scanning in SDN
- Chapter 5: The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks
- Chapter 6: Toward Formal Verification of SDN Access-Control Misconfigurations
- Chapter 7: A Review of Dynamic Verification of Security and Dependability Properties
- Chapter 8: A Formal Ticket-Based Authentication Scheme for VANETs
- Chapter 9: Toward a Security Scheme for an Intelligent Transport System
- Chapter 10: Security Policies a Formal Environment for a Test Cases Generation
- Compilation of References
- About the Contributors
- Index
Usage statistics
Access count: 0
Last 30 days: 0 Detailed usage statistics |