Catálogo de publicaciones - libros
Título de Acceso Abierto
Cybersecurity and Data Science
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
steganography; network security; steganography detection; steganalysis; machine learning; big data; IoT; pattern mining; wireless communications; covert channel; dirty constellation; wireless postmodulation steganography; phase drift; drift correction modulation; undetectability; security; quadrature amplitude modulation; spam; phishing; classification; augmented dataset; multi-language emails; cybersecurity; data protection; SoC; threat agents; motivation; opportunity; capability; user profiling; implicit; modeling; real-time user monitoring; complexity threat agent; threat assessment; network traffic analysis; convolutional neural networks; network traffic images; visualization of traffic; classifiers; e-mail; ham; data science; datasets; cyber threats modeling; multi-agent systems; cyber deception; pseudorandom sequences generators; prime numbers; additive Fibonacci generator; statistical characteristics; android device; BrainShield; hybrid model; malware detection; Omnidroid; image processing; BOSS database; ensemble classifier; deep learning; stegomalware; traffic analysis; network probe; hash function; SHA-3; FPGA; cognitive security; cyberattacks; game software; threat matrix computing; evaluation function; data modeling; authentication; bit template; information-processing electronic device; Poisson pulse sequences generators; n/a
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | Directory of Open access Books |
Información
Tipo de recurso:
libros
País de edición
Suiza