Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies
I. Alkanhal, Mohamed; Maleh, Yassine; ELAffendi, Mohammed; Mazurczyk, Wojciech; Abd El-Latif, Ahmed A.
Springer International Publishing AG
03/2024
334
Mole
Inglês
9783031211850
15 a 20 dias
Descrição não disponível.
Chapter 1: Malware Detection Using RGB Images and CNN Model Subclassing.- ?Chapter 2: IoT Trust Management as an SIoT Enabler Overcoming Security Issues?.- Chapter 3: Cloud Virtualization Attacks and Mitigation Techniques?.- Chapter 4: Android Ransomware Attacks Detection with Optimized Ensemble Learning?.- Chapter 5: A Dual Attack Tree Approach to Assist Command and Control Server Analysis of the Red Teaming Activity?.- Chapter 6: Intelligent Detection System for Spoofing and Jamming Attacks in UAVs.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computational Intelligence;Cybersecurity and Privacy;Conference Proceedings;Cybercrimes;Privacy and Security Models;Intelligent data analysis for Security;Deep Learning in security and privacy;Identity and Trust Management Intrusion;anomaly and fraud detection;Sensitive data collection;Privacy-preserving data mining Security and privacy of mobile
Chapter 1: Malware Detection Using RGB Images and CNN Model Subclassing.- ?Chapter 2: IoT Trust Management as an SIoT Enabler Overcoming Security Issues?.- Chapter 3: Cloud Virtualization Attacks and Mitigation Techniques?.- Chapter 4: Android Ransomware Attacks Detection with Optimized Ensemble Learning?.- Chapter 5: A Dual Attack Tree Approach to Assist Command and Control Server Analysis of the Red Teaming Activity?.- Chapter 6: Intelligent Detection System for Spoofing and Jamming Attacks in UAVs.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computational Intelligence;Cybersecurity and Privacy;Conference Proceedings;Cybercrimes;Privacy and Security Models;Intelligent data analysis for Security;Deep Learning in security and privacy;Identity and Trust Management Intrusion;anomaly and fraud detection;Sensitive data collection;Privacy-preserving data mining Security and privacy of mobile