Interdisciplinary Approach to Modern Network Security
portes grátis
Interdisciplinary Approach to Modern Network Security
Bhatia, Surbhi; Le, Dac-Nhuong; Sharma, Anand; Pramanik, Sabyasachi
Taylor & Francis Ltd
10/2024
190
Mole
9780367706104
15 a 20 dias
Descrição não disponível.
Chapter 1: Application of Artificial Intelligence in Cyber-security - A Detail Survey on Intrusion Detection System
Chapter 2: IoMT data Security Approach: Blockchain in Healthcare
Chapter 3: Machine Learning Approach for Network Intrusion Detection System
Chapter 4: Deep learning approach for network intrusion detection system
Chapter 5: Firewalls and Security
Chapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative Approach
Chapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare System
Chapter 8: Advanced Security System in Video Surveillance for COVID-19
Chapter 9: Secure Sound and Data Communication via Li-Fi
Chapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN
Chapter 2: IoMT data Security Approach: Blockchain in Healthcare
Chapter 3: Machine Learning Approach for Network Intrusion Detection System
Chapter 4: Deep learning approach for network intrusion detection system
Chapter 5: Firewalls and Security
Chapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative Approach
Chapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare System
Chapter 8: Advanced Security System in Video Surveillance for COVID-19
Chapter 9: Secure Sound and Data Communication via Li-Fi
Chapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Network Security;Interdisciplinary Security;Computer Networks;Network Intrusion Detection System;Support Vector Machines;Id;RNNs;Dl;Tcp;DoS;IoT Device;AE;Hardware Firewalls;IoT Environment;Sleep Time Durations;Sparse Auto Encoder;Software Firewalls;Deep Learning Approach;Packet Filtering;Canny Edge Detector;Host Id;DBN;Tcp Packet;Deep Bm;Stateful Inspection Firewalls;UDP Packet;Application Id;Edge Detection
Chapter 1: Application of Artificial Intelligence in Cyber-security - A Detail Survey on Intrusion Detection System
Chapter 2: IoMT data Security Approach: Blockchain in Healthcare
Chapter 3: Machine Learning Approach for Network Intrusion Detection System
Chapter 4: Deep learning approach for network intrusion detection system
Chapter 5: Firewalls and Security
Chapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative Approach
Chapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare System
Chapter 8: Advanced Security System in Video Surveillance for COVID-19
Chapter 9: Secure Sound and Data Communication via Li-Fi
Chapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN
Chapter 2: IoMT data Security Approach: Blockchain in Healthcare
Chapter 3: Machine Learning Approach for Network Intrusion Detection System
Chapter 4: Deep learning approach for network intrusion detection system
Chapter 5: Firewalls and Security
Chapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative Approach
Chapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare System
Chapter 8: Advanced Security System in Video Surveillance for COVID-19
Chapter 9: Secure Sound and Data Communication via Li-Fi
Chapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Network Security;Interdisciplinary Security;Computer Networks;Network Intrusion Detection System;Support Vector Machines;Id;RNNs;Dl;Tcp;DoS;IoT Device;AE;Hardware Firewalls;IoT Environment;Sleep Time Durations;Sparse Auto Encoder;Software Firewalls;Deep Learning Approach;Packet Filtering;Canny Edge Detector;Host Id;DBN;Tcp Packet;Deep Bm;Stateful Inspection Firewalls;UDP Packet;Application Id;Edge Detection