Add Wish List Add to Cart The item has been added Android Malware Detection using Machine Learning The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added High Accuracy Detection of Mobile Malware Using Machine Learning As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine... RRP: $135.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Developing a Gualia-Based Multi-Agent Architecture for use in Malware Detection Detecting network intruders and malicious software is a significant problem for network administrators and security experts. New threats are emerging at an increasing rate, and current signature and... RRP: $97.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Intelligence and Big Data Analytics for Cybersecurity Applications This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware... RRP: $389.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Learning and Knowledge Discovery in Databases. Research Track The multi-volume set LNAI 12975 until 12979 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2021, which was held... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication This book is a collection of best selected research papers presented at the Conference on Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication (MDCWC 2020) held... RRP: $509.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern,... RRP: $430.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile OS Vulnerabilities by Shivi Garg (Paperback) This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and... RRP: $73.99 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber-Security Threats, Actors, and Dynamic Mitigation Cyber-security and its related threats change constantly. The book aims at using practical contemporary machine learning-based techniques for detecting everyday threats such as, malware and dynamic... RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Exfiltration Threats and Prevention Techniques DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in... RRP: $267.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile OS Vulnerabilities by Shivi Garg (Hardcover) This is book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and... RRP: $254.10 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Intelligent Security Systems INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik... RRP: $213.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Three Percent Of The Vote In 2016, a Pennsylvania Congressman wins re-election against long odds. Can voting machines be hacked? Cyber sleuth Roy Landis is persuaded to investigate. Landis, a knight in tarnished armor, a... RRP: $28.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security and Computer Science This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection APPLYING ARTIFICIAL INTELLIGENCE CYBERSECURITY ANALYTICS CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying... RRP: $248.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Big Data Analytics and Forensics This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added AI in Cybersecurity This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and... RRP: $348.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Classification Methods for Internet Applications This book explores internet applications in which a crucial role is played by classification, such as spam filtering, recommender systems, malware detection, intrusion detection and sentiment... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration As malware has evolved over the years, it has gone from harmless programs that copy themselves into other executables to modern day botnets that perform bank fraud and identity theft. Modern malware... RRP: $97.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Tactical Wireshark Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Methods, Implementation, and Application of Cyber Security Intelligence and Analytics Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential... RRP: $543.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Global Cyber-Vulnerability Report This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Holistic Network Defense This work presents a hybrid network-host monitoring strategy, which fuses data from both the network and the host to recognize malware infections. This work focuses on three... RRP: $97.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Beginning x64 Assembly Programming Program in assembly starting with simple and basic programs, all the way up to AVX programming. By the end of this book, you will be able to write and read assembly code, mix assembly with higher... RRP: $65.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Securing IoT in Industry 4.0 Applications with Blockchain The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality,... RRP: $324.00 Add to Cart The item has been added