Cantitate/Preț
Produs

Machine Learning for Cyber Security: Lecture Notes in Computer Science

Editat de Dan Dongseong Kim, Chao Chen
en Limba Engleză Paperback – 23 apr 2024
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held in Yanuca Island, Fiji, during December 4–6, 2023.
The 11 full papers presented in this book were carefully reviewed and selected from 35 submissions. They cover a variety of topics, including cybersecurity, AI security, machine learning security, encryption, authentication, data security and privacy, cybersecurity forensic analysis, vulnerability analysis, malware analysis, anomaly and intrusion detection.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 72564 lei

Preț vechi: 90705 lei
-20% Nou

Puncte Express: 1088

Preț estimativ în valută:
12842 15061$ 11260£

Carte tipărită la comandă

Livrare economică 26 ianuarie-09 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789819724574
ISBN-10: 9819724570
Pagini: 188
Ilustrații: XII, 174 p. 69 illus., 59 illus. in color.
Dimensiuni: 155 x 235 x 11 mm
Greutate: 0.3 kg
Ediția:2024
Editura: Springer
Seria Lecture Notes in Computer Science

Locul publicării:Singapore, Singapore

Cuprins

Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform.- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers.- Pass File Graphical Password Authentication based on File Browsing Records.- On the Role of Similarity in Detecting Masquerading Files.- A Password-based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN.- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle Road Collaboration.- A client side watermarking with private class in Federated learning.- Research on Evasion and Detection of Malicious JavaScript Code.- Tackling Non IID for Federated Learning with Components Alignment.- Security on top of Security Detecting Malicious Firewall Policy Changes via K Means Clustering.- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability.