Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 103
- Història 69
- Management 60
- Information technology 52
- Computer security 48
- Data protection 44
- Security measures 44
- Biblia 43
- Filosofía 42
- Computer networks 41
- Elies 39
- Bíblia 34
- Crítica e interpretación 27
- History 25
- Arte 24
- Business enterprises 24
- Standards 23
- Biografia 20
- Goigs 20
- historia 20
- Didáctica 18
- Lógica 17
- Economía 16
- Crítica i interpretació 15
- Wiesel, Elie 15
- Judaísmo 14
- Law and legislation 14
- Películas cinematográficas 14
- Catalunya 13
- Judaisme 13
-
1781por Sountharrajan, S.Tabla de Contenidos: “…7.3 XAI and Its Categorization -- 7.3.1 Intrinsic or Post-Hoc -- 7.3.2 Model-Specific or Model-Agnostic -- 7.3.3 Local or Global -- 7.3.4 Explanation Output -- 7.4 XAI Framework -- 7.4.1 SHAP (SHAPley Additive Explanations) and SHAPley Values -- 7.4.1.1 Computing SHAPley Values -- 7.4.2 LIME - Local Interpretable Model Agnostic Explanations -- 7.4.2.1 Working of LIME -- 7.4.3 ELI5 -- 7.4.4 Skater -- 7.4.5 DALEX -- 7.5 Applications of XAI in Cybersecurity -- 7.5.1 Smart Healthcare -- 7.5.2 Smart Banking -- 7.5.3 Smart Cities -- 7.5.4 Smart Agriculture -- 7.5.5 Transportation -- 7.5.6 Governance -- 7.5.7 Industry 4.0 -- 7.5.8 5G and Beyond Technologies -- 7.6 Challenges of XAI Applications in Cybersecurity -- 7.6.1 Datasets -- 7.6.2 Evaluation -- 7.6.3 Cyber Threats Faced by XAI Models -- 7.6.4 Privacy and Ethical Issues -- 7.7 Future Research Directions -- 7.8 Conclusion -- References -- Chapter 8 AI-Enabled Threat Detection and Security Analysis -- 8.1 Introduction -- 8.1.1 Phishing -- 8.1.2 Features -- 8.1.3 Optimizer Types -- 8.1.4 Gradient Descent -- 8.1.5 Types of Phishing Attack Detection -- 8.2 Literature Survey -- 8.3 Proposed Work -- 8.3.1 Data Collection and Pre-Processing -- 8.3.2 Dataset Description -- 8.3.3 Performance Metrics -- 8.4 System Evaluation -- 8.5 Conclusion -- References -- Chapter 9 Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme -- 9.1 Introduction -- 9.1.1 Need of Trust -- 9.1.2 Need of Trust-Based Mechanism in IoT Devices -- 9.1.3 Contribution -- 9.2 Related Work -- 9.3 Proposed Framework -- 9.3.1 Dynamic Trust Updation Model -- 9.3.2 Blockchain Network -- 9.4 Performance Analysis -- 9.4.1 Dataset Description and Simulation Settings -- 9.4.2 Traditional Method and Evaluation Metrics -- 9.5 Results Discussion -- 9.6 Empirical Analysis -- 9.7 Conclusion -- References…”
Publicado 2023
Libro electrónico -
1782
-
1783
-
1784
-
1785
-
1786
-
1787
-
1788
-
1789
-
1790
-
1791
-
1792
-
1793
-
1794
-
1795
-
1796
-
1797
-
1798
-
1799
-
1800