Torrent details for "Thakkar H. Predictive Data Security using AI. Insights and Issues...2022 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
4.47 MB
Info Hash:
7846ae0fe173a0591cc71349c0b035481981f2b0
Added By:
Added:  
06-12-2022 09:24
Views:
96
Health:
Seeds:
2
Leechers:
0
Completed:
89
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques. Moreover, Machine Learning (ML) and Deep Learning (DL) algorithms are also not secured and often manipulated by attackers for data stealing. This book also discusses the types of attacks and offers novel solutions to counter the attacks on ML and DL algorithms. This book describes the concepts and issues with figures and the supporting arguments with facts and charts. In addition to that, the book provides the comparison of different security solutions in terms of experimental results with tables and charts. Besides, the book also provides the future directions for each chapter and novel alternative approaches, wherever applicable. Often the existing literature provides domain-specific knowledge such as the description of security aspects. However, the readers find it difficult to understand how to tackle the application-specific security issues. This book takes one step forward and offers the security issues, current trends, and technologies supported by alternate solutions. Moreover, the book provides thorough guidance on the applicability of ML and DL algorithms to deal with application-specific security issues followed by novel approaches to counter threats to ML and DL algorithms. The book includes contributions from academicians, researchers, security experts, security architectures, and practitioners and provides an in-depth understanding of the mentioned issues.
A Comprehensive Study of Security Aspects in Blockchain
An Exploration Analysis of Social Media Security
A Pragmatic Analysis of Security Concerns in Cloud, Fog, and Edge Environment
Secure Information and Data Centres: An Exploratory Study
Blockchain-Based Secure E-voting System Using Aadhaar Authentication
DevOps Tools: Silver Bullet for Software Industry
Robust and Secured Reversible Data Hiding Approach for Medical Image Transmission over Smart Healthcare Environment
Advancements in Reversible Data Hiding Techniques and Its Applications in Healthcare Sector
Security Issues in Deep Learning
CNN-Based Models for Image Forgery Detection

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes