Mostrando 1,381 - 1,400 Resultados de 3,736 Para Buscar '"Cats"', tiempo de consulta: 0.06s Limitar resultados
  1. 1381
    Publicado 1949
    Libro
  2. 1382
    Publicado 1909
    Libro
  3. 1383
    Publicado 1911
    Libro
  4. 1384
    Publicado 1906
    Libro
  5. 1385
    Libro
  6. 1386
    Publicado 1962
    Libro
  7. 1387
    Publicado 1908
    Libro
  8. 1388
    Publicado 1925
    Libro
  9. 1389
    Publicado 1894
    Libro
  10. 1390
    Libro
  11. 1391
    por Escosura, Jerónimo de la
    Publicado 1830
    Libro
  12. 1392
    por Pena Vázquez, Silverio
    Publicado 1964
    Libro
  13. 1393
    por Tyagi, Amit Kumar
    Publicado 2024
    Tabla de Contenidos: “…Part 2: Methods and Techniques -- Chapter 6 An Automatic Artificial Intelligence System for Malware Detection -- 6.1 Introduction -- 6.2 Malware Types -- 6.3 Structure Format of Binary Executable Files -- 6.4 Malware Analysis and Detection -- 6.5 Malware Techniques to Evade Analysis and Detection -- 6.6 Malware Detection With Applying AI -- 6.7 Open Issues and Challenges -- 6.8 Discussion and Conclusion -- References -- Chapter 7 Early Detection of Darknet Traffic in Internet of Things Applications -- 7.1 Introduction -- 7.2 Literature Survey -- 7.3 Proposed Work -- 7.3.1 Drawback -- 7.4 Analysis of the Work -- 7.5 Future Work -- 7.6 Conclusion -- References -- Chapter 8 A Novel and Efficient Approach to Detect Vehicle Insurance Claim Fraud Using Machine Learning Techniques -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Implementation and Analysis -- 8.3.1 Dataset Description -- 8.3.2 Methodology -- 8.3.3 Checking for Missing Values -- 8.3.4 Exploratory Data Analysis -- 8.4 Conclusion -- 8.4.1 Future Work -- 8.4.2 Limitations -- References -- Chapter 9 Automated Secure Computing for Fraud Detection in Financial Transactions -- 9.1 Introduction -- 9.2 Historical Perspective -- 9.3 Previous Models for Fraud Detection in Financial Transactions -- 9.3.1 CatBoost -- 9.3.2 XGBoost -- 9.3.3 LightGBM -- 9.4 Proposed Model Based on Automated Secure Computing -- 9.5 Discussion -- 9.6 Conclusion -- References -- Additional Readings -- Chapter 10 Data Anonymization on Biometric Security Using Iris Recognition Technology -- 10.1 Introduction -- 10.2 Problems Faced in Facial Recognition -- 10.3 Face Recognition -- 10.4 The Important Aspects of Facial Recognition -- 10.5 Proposed Methodology -- 10.6 Results and Discussion -- 10.7 Conclusion -- References -- Chapter 11 Analysis of Data Anonymization Techniques in Biometric Authentication System…”
    Libro electrónico
  14. 1394
    Publicado 2017
    Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
    Libro
  15. 1395
    por Kees, Johann Georg
    Publicado 1726
    991006585949706719
  16. 1396
  17. 1397
    por Alonso Muæoyerro, Luis
    Publicado 1947
    Libro
  18. 1398
    Libro
  19. 1399
    Publicado 1911
    Libro
  20. 1400
    Publicado 1888
    Libro