Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Artificial intelligence. --- Multiagent systems. --- Agent-based model (Computer software) --- MASs (Multiagent systems) --- Multi-agent systems --- Systems, Multiagent --- Intelligent agents (Computer software) --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers
Choose an application
This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.
Choose an application
Choose an application
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Games, Theory of --- Theory of games --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Algorism --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Mathematical models --- Mathematics --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Choose an application
Choose an application
With the increasing public interest in artificial intelligence (AI), there is also increasing interest in learning about the benefits that AI can deliver to society. This book focuses on research advances in AI that benefit the conservation of wildlife, forests, coral reefs, rivers, and other natural resources. It presents how the joint efforts of researchers in computer science, ecology, economics, and psychology help address the goals of the United Nations' 2030 Agenda for Sustainable Development. Written at a level accessible to conservation professionals and AI researchers, the book offers both an overview of the field and an in-depth view of how AI is being used to understand patterns in wildlife poaching and enhance patrol efforts in response, covering research advances, field tests and real-world deployments. The book also features efforts in other major conservation directions, including protecting natural resources, ecosystem monitoring, and bio-invasion management through the use of game theory, machine learning, and optimization.
aWildlife conservation --- Artificial intelligence. --- Technological innovations.
Choose an application
Choose an application
Data mining --- Data processing. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Mineria de dades --- Prospecció de dades --- Cerca en bases de dades --- Arquitectura orientada a serveis (Informàtica) --- Extracció de dades de llocs web --- Mineria de web
Listing 1 - 10 of 11 | << page >> |
Sort by
|