Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Integrating advanced technologies fo...
~
Rocha, Álvaro.
Linked to FindBook
Google Book
Amazon
博客來
Integrating advanced technologies for enhanced security and efficiency
Record Type:
Electronic resources : Monograph/item
Title/Author:
Integrating advanced technologies for enhanced security and efficiency/ edited by Alvaro Rocha ... [et al.].
other author:
Rocha, Álvaro.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
ix, 398 p. :ill. (chiefly col.), digital ;24 cm.
[NT 15003449]:
AI-Powered Threat Detection and Prevention -- Cyber Threat Detection and Classification Using Machine Learning Techniques -- A Network Intrusion Detection System using Machine Learning Algorithms -- Enhancing Real-time Security Monitoring: A Hybrid Machine Learning Approach to Cyber Threat Detection -- Hybrid Ensemble Models for Phishing Website Detection: A Comprehensive Comparative Analysis Using varies Classifier Approaches -- Federated Threat Detection with Dirichlet Distribution -- Safeguarding Authenticity: Tackling the Cybersecurity Implications of Deepfake AI -- Evaluating TabNet's Performance Against Phishing Threats using Deep Learning for Cybersecurity -- Integrating AI, IoT, and Blockchain for Holistic Solutions -- Pragmatic review and Implementation of models targeted toward the identification of fake social media profiles -- Multi- Task Cascaded Convolutional Neural Network Foundation for Driver Drowsiness Detection -- Countering the Imposters: An Efficient Multimodal Approach to Fake Profile Detection on Social Media Sites.
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-031-91798-1
ISBN:
9783031917981
Integrating advanced technologies for enhanced security and efficiency
Integrating advanced technologies for enhanced security and efficiency
[electronic resource] /edited by Alvaro Rocha ... [et al.]. - Cham :Springer Nature Switzerland :2025. - ix, 398 p. :ill. (chiefly col.), digital ;24 cm. - Engineering cyber-physical systems and critical infrastructures,v. 142731-5010 ;. - Engineering cyber-physical systems and critical infrastructures ;v. 14..
AI-Powered Threat Detection and Prevention -- Cyber Threat Detection and Classification Using Machine Learning Techniques -- A Network Intrusion Detection System using Machine Learning Algorithms -- Enhancing Real-time Security Monitoring: A Hybrid Machine Learning Approach to Cyber Threat Detection -- Hybrid Ensemble Models for Phishing Website Detection: A Comprehensive Comparative Analysis Using varies Classifier Approaches -- Federated Threat Detection with Dirichlet Distribution -- Safeguarding Authenticity: Tackling the Cybersecurity Implications of Deepfake AI -- Evaluating TabNet's Performance Against Phishing Threats using Deep Learning for Cybersecurity -- Integrating AI, IoT, and Blockchain for Holistic Solutions -- Pragmatic review and Implementation of models targeted toward the identification of fake social media profiles -- Multi- Task Cascaded Convolutional Neural Network Foundation for Driver Drowsiness Detection -- Countering the Imposters: An Efficient Multimodal Approach to Fake Profile Detection on Social Media Sites.
This book examines the profound impact of emerging innovations on security and operational effectiveness. This book brings together leading experts in artificial intelligence, blockchain, IoT, and cyber security to tackle key challenges in protecting digital and physical infrastructures. Covering areas such as automated threat detection, secure data exchange, and intelligent system optimization, the book offers practical strategies and case studies. Designed for researchers, professionals, and policymakers, it serves as a comprehensive resource for harnessing advanced technologies to build resilient and efficient security frameworks. Whether mitigating cyber threats, streamlining industrial operations, or improving decision-making, this book provides essential insights for navigating today's rapidly evolving technological landscape.
ISBN: 9783031917981
Standard No.: 10.1007/978-3-031-91798-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Integrating advanced technologies for enhanced security and efficiency
LDR
:03031nmm a2200337 a 4500
001
2414270
003
DE-He213
005
20250809130217.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031917981
$q
(electronic bk.)
020
$a
9783031917974
$q
(paper)
024
7
$a
10.1007/978-3-031-91798-1
$2
doi
035
$a
978-3-031-91798-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2025
245
0 0
$a
Integrating advanced technologies for enhanced security and efficiency
$h
[electronic resource] /
$c
edited by Alvaro Rocha ... [et al.].
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
ix, 398 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Engineering cyber-physical systems and critical infrastructures,
$x
2731-5010 ;
$v
v. 14
505
0
$a
AI-Powered Threat Detection and Prevention -- Cyber Threat Detection and Classification Using Machine Learning Techniques -- A Network Intrusion Detection System using Machine Learning Algorithms -- Enhancing Real-time Security Monitoring: A Hybrid Machine Learning Approach to Cyber Threat Detection -- Hybrid Ensemble Models for Phishing Website Detection: A Comprehensive Comparative Analysis Using varies Classifier Approaches -- Federated Threat Detection with Dirichlet Distribution -- Safeguarding Authenticity: Tackling the Cybersecurity Implications of Deepfake AI -- Evaluating TabNet's Performance Against Phishing Threats using Deep Learning for Cybersecurity -- Integrating AI, IoT, and Blockchain for Holistic Solutions -- Pragmatic review and Implementation of models targeted toward the identification of fake social media profiles -- Multi- Task Cascaded Convolutional Neural Network Foundation for Driver Drowsiness Detection -- Countering the Imposters: An Efficient Multimodal Approach to Fake Profile Detection on Social Media Sites.
520
$a
This book examines the profound impact of emerging innovations on security and operational effectiveness. This book brings together leading experts in artificial intelligence, blockchain, IoT, and cyber security to tackle key challenges in protecting digital and physical infrastructures. Covering areas such as automated threat detection, secure data exchange, and intelligent system optimization, the book offers practical strategies and case studies. Designed for researchers, professionals, and policymakers, it serves as a comprehensive resource for harnessing advanced technologies to build resilient and efficient security frameworks. Whether mitigating cyber threats, streamlining industrial operations, or improving decision-making, this book provides essential insights for navigating today's rapidly evolving technological landscape.
650
0
$a
Computer security.
$3
540555
650
0
$a
Artificial intelligence.
$3
516317
650
1 4
$a
Data Engineering.
$3
3409361
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Rocha, Álvaro.
$3
3626791
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Engineering cyber-physical systems and critical infrastructures ;
$v
v. 14.
$3
3790869
856
4 0
$u
https://doi.org/10.1007/978-3-031-91798-1
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519725
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login