Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.
fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing
Choose an application
Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.
fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing
Choose an application
Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.
fintech --- financial technology --- blockchain --- deep learning --- regtech --- environment --- social sciences --- machine learning --- learning analytics --- student field forecasting --- imbalanced datasets --- explainable machine learning --- intelligent tutoring system --- adversarial machine learning --- transfer learning --- cognitive bias --- stock market --- behavioural finance --- investor’s profile --- Teheran Stock Exchange --- unsupervised learning --- clustering --- big data frameworks --- fault tolerance --- stream processing systems --- distributed frameworks --- Spark --- Hadoop --- Storm --- Samza --- Flink --- comparative analysis --- a survey --- data science --- educational data mining --- supervised learning --- secondary education --- academic performance --- text-to-SQL --- natural language processing --- database --- machine translation --- medical image segmentation --- convolutional neural networks --- SE block --- U-net --- DeepLabV3plus --- cyber-security --- medical services --- cyber-attacks --- data communication --- distributed ledger --- identity management --- RAFT --- HL7 --- electronic health record --- Hyperledger Composer --- cybersecurity --- password security --- browser security --- social media --- ANOVA --- SPSS --- internet of things --- cloud computing --- computational models --- metaheuristics --- phishing detection --- website phishing
Choose an application
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks Who This Book Is For Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.
Computer crimes. --- Computer security. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Security measures --- Phishing --- Prevention. --- Brand spoofing (Internet fraud) --- Carding (Internet fraud) --- Spoofing, Brand (Internet fraud) --- Identity theft --- Internet fraud
Choose an application
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks.
Phishing --- Computer security. --- Prevention. --- Brand spoofing (Internet fraud) --- Carding (Internet fraud) --- Spoofing, Brand (Internet fraud) --- Identity theft --- Internet fraud --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data protection. --- Data and Information Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing
Choose an application
Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.
n/a --- personal health record --- emergency access --- access control --- blockchain --- hyperledger fabric --- hyperledger composer --- auditability --- privacy & --- security --- healthcare --- review --- electronic medical record --- cloud --- internet of things --- technology convergence --- eHealth --- medical devices --- digital health --- mHealth --- cyber-risk --- pacemaker --- artificial pancreas --- app --- regulation --- wearable device --- digital identity --- decentralized identity --- identity management --- smart contract --- Ethereum --- sexism --- social networks --- adolescence --- digital gender gap --- emotional well-being --- healthcare service --- body area network --- privacy --- authentication --- security protocol --- cybersecurity culture --- COVID-19 --- security assessment --- phishing --- health domain --- cybersecurity --- fuzzy cognitive maps --- telehealth --- scenario analysis --- planning --- contact tracing --- pandemic --- fall detection --- fall prediction --- fall prevention --- fall risk factors --- gait assessment --- 5G networks --- key performance indicators --- wireless communication --- awareness --- healthcare domain
Choose an application
Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.
Medical equipment & techniques --- n/a --- personal health record --- emergency access --- access control --- blockchain --- hyperledger fabric --- hyperledger composer --- auditability --- privacy & --- security --- healthcare --- review --- electronic medical record --- cloud --- internet of things --- technology convergence --- eHealth --- medical devices --- digital health --- mHealth --- cyber-risk --- pacemaker --- artificial pancreas --- app --- regulation --- wearable device --- digital identity --- decentralized identity --- identity management --- smart contract --- Ethereum --- sexism --- social networks --- adolescence --- digital gender gap --- emotional well-being --- healthcare service --- body area network --- privacy --- authentication --- security protocol --- cybersecurity culture --- COVID-19 --- security assessment --- phishing --- health domain --- cybersecurity --- fuzzy cognitive maps --- telehealth --- scenario analysis --- planning --- contact tracing --- pandemic --- fall detection --- fall prediction --- fall prevention --- fall risk factors --- gait assessment --- 5G networks --- key performance indicators --- wireless communication --- awareness --- healthcare domain
Choose an application
Cybercrime is increasingly exposing the health domain to growing risk. The push towards a strong connection of citizens to health services, through digitalization, has undisputed advantages. Digital health allows remote care, the use of medical devices with a high mechatronic and IT content with strong automation, and a large interconnection of hospital networks with an increasingly effective exchange of data. However, all this requires a great cybersecurity commitment—a commitment that must start with scholars in research and then reach the stakeholders. New devices and technological solutions are increasingly breaking into healthcare, and are able to change the processes of interaction in the health domain. This requires cybersecurity to become a vital part of patient safety through changes in human behaviour, technology, and processes, as part of a complete solution. All professionals involved in cybersecurity in the health domain were invited to contribute with their experiences. This book contains contributions from various experts and different fields. Aspects of cybersecurity in healthcare relating to technological advance and emerging risks were addressed. The new boundaries of this field and the impact of COVID-19 on some sectors, such as mhealth, have also been addressed. We dedicate the book to all those with different roles involved in cybersecurity in the health domain.
Medical equipment & techniques --- n/a --- personal health record --- emergency access --- access control --- blockchain --- hyperledger fabric --- hyperledger composer --- auditability --- privacy & --- security --- healthcare --- review --- electronic medical record --- cloud --- internet of things --- technology convergence --- eHealth --- medical devices --- digital health --- mHealth --- cyber-risk --- pacemaker --- artificial pancreas --- app --- regulation --- wearable device --- digital identity --- decentralized identity --- identity management --- smart contract --- Ethereum --- sexism --- social networks --- adolescence --- digital gender gap --- emotional well-being --- healthcare service --- body area network --- privacy --- authentication --- security protocol --- cybersecurity culture --- COVID-19 --- security assessment --- phishing --- health domain --- cybersecurity --- fuzzy cognitive maps --- telehealth --- scenario analysis --- planning --- contact tracing --- pandemic --- fall detection --- fall prediction --- fall prevention --- fall risk factors --- gait assessment --- 5G networks --- key performance indicators --- wireless communication --- awareness --- healthcare domain
Listing 1 - 8 of 8 |
Sort by
|