Details
Title | Artificial intelligence and security challenges in emerging networks |
---|---|
Other creators | Abassi Ryma |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Computer networks — Security measures. ; Internet — Security measures. ; Malware (Computer software) ; Artificial intelligence. ; COMPUTERS / General ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1081315659 |
Record create date | 1/10/2019 |
Allowed Actions
pdf/1996428.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/1996428.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book explores the recent rise of emerging networking technologies such as social networks, content centric networks, IoT networks, etc. It also examines the applications of artificial intelligence (AI), machine learning, and data mining to security and privacy problems"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Title Page
- Copyright Page
- Book Series
- Editorial Advisory Board
- Table of Contents
- Detailed Table of Contents
- Preface
- Acknowledgment
- Chapter 1: The Age of Ransomware
- Chapter 2: A Review of Security Mechanisms for Multi-Agent Systems
- Chapter 3: Attack Detection in Cloud Networks Based on Artificial Intelligence Approaches
- Chapter 4: Network Manipulation Using Network Scanning in SDN
- Chapter 5: The Usage Analysis of Machine Learning Methods for Intrusion Detection in Software-Defined Networks
- Chapter 6: Toward Formal Verification of SDN Access-Control Misconfigurations
- Chapter 7: A Review of Dynamic Verification of Security and Dependability Properties
- Chapter 8: A Formal Ticket-Based Authentication Scheme for VANETs
- Chapter 9: Toward a Security Scheme for an Intelligent Transport System
- Chapter 10: Security Policies a Formal Environment for a Test Cases Generation
- Compilation of References
- About the Contributors
- Index