Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense
Автор: Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian, Edward G. Amoroso
Издательство: Cambridge University Press
Год: 2021
Формат: PDF
Страниц: 225
Размер: 10 Mb
Язык: English

Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.
Разместил: vitvikvas 31-01-2022, 19:05 | Комментарии: 0 | Подробнее
Machine Learning for Cyber Agents: Attack and DefenceНазвание: Machine Learning for Cyber Agents: Attack and Defence
Автор: Stanislav Abaimov, Maurizio Martellini
Издательство: Springer
Год: 2022
Страниц: 235
Язык: английский
Формат: pdf (true), epub
Размер: 11.5 MB

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences.
Разместил: Ingvar16 31-01-2022, 08:00 | Комментарии: 0 | Подробнее
The Development of Blockchain TechnologyНазвание: The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China
Автор: Center for Electronics and Information Studies Chinese Academy of Engineering
Издательство: Springer, Science Press
Год: 2022
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

The research objects of blockchain are the concept, development process, core value of blockchain, and focuses on the core technology and classification of blockchain technology. And summarizes the development situation of the global and Chinese blockchain industry, including the status quo of policy measures, standard construction, and application development. Finally, summarize the main innovation points of blockchain technology, including its development in China, and prospects the future development of blockchain technology. The book is divided into six chapters. The first chapter introduces the concept, development process, and core value of blockchain. Chapter 2 focuses on the core technology and classification of blockchain technology. Chapter 3 summarizes the development situation of the global and Chinese blockchain industry, including the status quo of policy measures, standard construction, and application development.
Разместил: Ingvar16 30-01-2022, 18:25 | Комментарии: 0 | Подробнее
Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the FutureНазвание: Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future
Автор: Sudhir K. Sharma, Bharat Bhushan, Narayan C. Debnath
Издательство: Bentham Science Publishers
Год: 2022
Страниц: 294
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

This reference presents information about different facets of IoT and blockchain systems that have been recently proposed for practical situations. Chapters provide knowledge about how these technologies are applied in functions related to trust management, identity management, security threats, access control and privacy. The Internet of Things (IoT) is an emerging technology that has enabled connection and communication between both virtual and physical objects, thereby improving our quality of life. The definition of IoT has evolved because of the convergence of numerous technologies such as embedded systems, commodity sensors, machine learning, and real-time analytics. IoT contributes towards the concept of connected vehicles, connected health, wearable technology, home automation, and appliances having remote monitoring capabilities. Even though these systems provide numerous advantages, the current centralized architecture brings forth numerous issues related to privacy, security, transparency, data integrity, and single point of failure. This, in turn, inhibits the future development of these IoT-based applications.
Разместил: Ingvar16 30-01-2022, 17:53 | Комментарии: 0 | Подробнее
Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc NetworksНазвание: Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks
Автор: Sanjoy Das, Ram Shringar Rao, Indrani Das
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies: Classifications, Advancement and Applications
Год: 2022
Страниц: 291
Язык: английский
Формат: pdf (true)
Размер: 13.7 MB

This reference text covers intelligent computing through Internet of Things (IoT) and Big Data in Vehicular Environment in a single volume. The text covers important topics including topology-based routing protocols, heterogeneous wireless networks, security risks, software-defined vehicular Ad-hoc network, vehicular delay tolerant networks, and energy harvesting for WSNs using rectenna. In recent times, tremendous growth and usage of various wireless ad-hoc networks such as Mobile Ad-hoc Networks (MANETs), Vehicular Ad-hoc Networks (VANETs), Wireless Sensor Networks (WSNs), and IoT-based Cloud Networks (ICN) has emerged. These emerging networks open lots of opportunities for researchers to explore these areas and enhance their efficacy. Advanced technologies like cloud computing, Big-data, and Internet of Things (IoT)-based services have been well incorporated in wireless networks. Day by day, wireless devices and their uses are increasing very rapidly. Many industries are developing huge numbers of applications of wireless networks to ease our day-to-day works; simultaneously, these applications generate a large volume of data. To better manage these data and optimize network performance, IoT, cloud, and Big-data techniques play a vital role.
Разместил: Ingvar16 30-01-2022, 17:29 | Комментарии: 0 | Подробнее
Название: Экономика удаленки: Как облачные технологии и искусственный интеллект меняют работу
Автор: Мэттью Моттола, Мэттью Котни
Издательство: Альпина
Год: 2022
Формат: ePUB, PDF
Страниц: 240
Размер: 10 Mb
Язык: Русский

Как выглядит рабочее место будущего? Надо ли в срочном порядке переводить всех специалистов на удаленный формат работы? Как тогда организовывать этот переход? Мэттью Моттолла и Мэттью Котни дают советы, как организациям и отдельным командам пользоваться возможностями искусственного интеллекта для повышения эффективности рабочего места. Облачные технологии действительно способны сделать наш труд намного рациональнее, эффективнее, но для миграции в облако необходимо понимать все его плюсы и минусы. Благодаря книге вы поймете, как целесообразно использовать удаленных и внештатных специалистов; также сможете предугадать, как тенденция перехода на удаленный формат работы будет развиваться и как преодолеть типичные препятствия, которые удерживают большинство организаций от изменений.
Разместил: vitvikvas 30-01-2022, 17:05 | Комментарии: 0 | Подробнее
Название: Переход в облако: Практическое руководство по организации облачных вычислений для ученых и IT-специалистов
Автор: Хуан Аньель, Диего Монтес, Хавьер Родейро Иглесиа
Издательство: Альпина
Год: 2022
Формат: ePUB, PDF
Страниц: 120
Размер: 10 Mb
Язык: Русский

Многим ученым в ходе работы приходится делать высокопроизводительные вычисления и хранить большие объемы данных. Для этого нужно дорогостоящее оборудование, а порой и целый IT-отдел, занимающийся его поддержкой и настройкой. Эффективным решением могут стать облачные сервисы, которые быстро предоставляют доступ к необходимым ресурсам, позволяют легко обмениваться данными и хранить их вне локальных компьютеров и значительно снижают затраты на техническое оснащение лабораторий и исследовательских центров.
Облачные технологии уже сегодня широко используются в математике, физике, археологии, исследованиях атмосферы и климата, медицине, космических исследованиях, энергетике и других областях. Они расширяют возможности научных исследований за счет собственных мощностей, способствуют развитию науки в неблагополучных странах и областях, помогают развивать международное научное сотрудничество, предоставляют высокий уровень кибербезопасности, позволяют оптимизировать расходы и воздействие на окружающую среду. Облачные сервисы также внедряют в небольшие стартапы и крупные бизнесы с большим количеством сотрудников, клиентов и поставщиков, так как они обеспечивают постоянную синхронизацию и мобильность.
Разместил: vitvikvas 30-01-2022, 17:03 | Комментарии: 0 | Подробнее
The Tactile InternetНазвание: The Tactile Internet
Автор: Tara Ali-Yahiya, Wrya Monnet
Издательство: Wiley-ISTE
Год: 2022
Страниц: 256
Язык: английский
Формат: pdf, epub
Размер: 10.4 MB

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book provides an introduction to the Tactile Internet and its case studies, with its impact on the democratization of haptic applications based on the IEEE 1918.1 standard through teleoperations. The case studies are based on cutting-edge technologies that enable the deployment of the Tactile Internet. 5G, and recently 6G, Software-Defined Networking, the different learning techniques in the Artificial Intelligence domain, Edge Computing for service proximity, etc. are all factors that will support the successful deployment of the Tactile Internet. This book is a solid contribution to this research area.
Разместил: Ingvar16 29-01-2022, 05:06 | Комментарии: 0 | Подробнее
Название: Federated Learning for Wireless Networks
Автор: Choong Seon Hong, Latif U. Khan, Mingzhe Chen
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 257
Язык: английский
Формат: pdf (true)
Размер: 10.6 MB

Recently Machine Learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using Machine Learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, Federated Learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training.
Разместил: Ingvar16 28-01-2022, 04:11 | Комментарии: 0 | Подробнее
Advances in Malware and Data-Driven Network SecurityНазвание: Advances in Malware and Data-Driven Network Security
Автор: Brij B. Gupta
Издательство: Information Science Reference, IGI Global
Год: 2022
Страниц: 326
Язык: английский
Формат: pdf (true), epub
Размер: 31.3 MB

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, Machine Learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.
Разместил: Ingvar16 27-01-2022, 16:55 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности