Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Catequesis- 97
- Història 69
- Niæos 56
- Bíblia 47
- Historia 43
- Església Catòlica 40
- Engineering & Applied Sciences 37
- Lengua inglesa 34
- Pastoral 34
- Operating systems (Computers) 33
- Crítica bíblica 30
- Obres anteriors al 1800 29
- Catecismos 27
- Aæo litœrgico- 26
- Computer Science 25
- Revistes 25
- Dret canònic 24
- Catequesis 22
- Comentaris 22
- Teologia dogmàtica 21
- Application software 19
- Computer security 19
- Development 19
- Gatos 19
- Documentales 18
- Novela norteamericana 18
- Security measures 17
- Teologia 17
- Crítica i interpretació 16
- Linux 16
-
1381
-
1382
-
1383
-
1384
-
1385
-
1386
-
1387
-
1388
-
1389
-
1390
-
1391
-
1392
-
1393por Tyagi, Amit KumarTabla de Contenidos: “…Part 2: Methods and Techniques -- Chapter 6 An Automatic Artificial Intelligence System for Malware Detection -- 6.1 Introduction -- 6.2 Malware Types -- 6.3 Structure Format of Binary Executable Files -- 6.4 Malware Analysis and Detection -- 6.5 Malware Techniques to Evade Analysis and Detection -- 6.6 Malware Detection With Applying AI -- 6.7 Open Issues and Challenges -- 6.8 Discussion and Conclusion -- References -- Chapter 7 Early Detection of Darknet Traffic in Internet of Things Applications -- 7.1 Introduction -- 7.2 Literature Survey -- 7.3 Proposed Work -- 7.3.1 Drawback -- 7.4 Analysis of the Work -- 7.5 Future Work -- 7.6 Conclusion -- References -- Chapter 8 A Novel and Efficient Approach to Detect Vehicle Insurance Claim Fraud Using Machine Learning Techniques -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Implementation and Analysis -- 8.3.1 Dataset Description -- 8.3.2 Methodology -- 8.3.3 Checking for Missing Values -- 8.3.4 Exploratory Data Analysis -- 8.4 Conclusion -- 8.4.1 Future Work -- 8.4.2 Limitations -- References -- Chapter 9 Automated Secure Computing for Fraud Detection in Financial Transactions -- 9.1 Introduction -- 9.2 Historical Perspective -- 9.3 Previous Models for Fraud Detection in Financial Transactions -- 9.3.1 CatBoost -- 9.3.2 XGBoost -- 9.3.3 LightGBM -- 9.4 Proposed Model Based on Automated Secure Computing -- 9.5 Discussion -- 9.6 Conclusion -- References -- Additional Readings -- Chapter 10 Data Anonymization on Biometric Security Using Iris Recognition Technology -- 10.1 Introduction -- 10.2 Problems Faced in Facial Recognition -- 10.3 Face Recognition -- 10.4 The Important Aspects of Facial Recognition -- 10.5 Proposed Methodology -- 10.6 Results and Discussion -- 10.7 Conclusion -- References -- Chapter 11 Analysis of Data Anonymization Techniques in Biometric Authentication System…”
Publicado 2024
Libro electrónico -
1394Publicado 2017Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
Libro -
1395
-
1396
-
1397
-
1398
-
1399
-
1400