-
181
AWS Certified Security Study Guide : Specialty (SCS-C01) Exam
Indianapolis : Sybex, 2021Table of Contents: “…The OSI Reference Model -- The TCP/IP Protocol Stack -- Main Classes of Attacks -- Reconnaissance -- Password Attacks -- Eavesdropping Attacks -- IP Spoofing Attacks -- Man-in-the-Middle Attacks -- Denial-of-Service Attacks -- Malware Attacks -- Phishing Attacks -- Risk Management -- Important Security Solutions and Services -- Well-Known Security Frameworks and Models -- Sample Practical Models for Guiding Security Design and Operations -- The Security Wheel -- The Attack Continuum Model -- The Zero-Trust Model -- Summary -- Exam Essentials -- Review Questions…”
Format: Electronic eBookFull text (Wentworth users only)
-
182
Cloud attack vectors : building effective cyber-defense strategies to protect cloud resources
New York, NY : Apress, 2022Table of Contents: “…A05:2021 - Security Misconfiguration -- A06:2021 - Vulnerable and Outdated Components -- A07:2021 - Identification and Authentication Failures -- A08:2021 - Software and Data Integrity Failures -- A09:2021 - Security Logging and Monitoring Failures -- A10:2021 - Server-Side Request Forgery -- Configurations -- PKI (Public Key Infrastructure) -- Credentials -- Keys -- S3 Buckets -- Identities -- Entitlements -- API -- Denial of Service -- Authentication -- Certificates -- BGP/DNS -- Ransomware -- Crypto Mining -- Phishing -- Lateral Movement -- Remote Access (RDP) -- Remote Access (SSH)…”
[First edition].
Format: Electronic eBookFull text (Wentworth users only)
-
183
Computational Intelligence in Data Science 7th IFIP TC 12 International Conference, ICCIDS 2024, Chennai, India, February 21–23, 2024, Revised Selected Papers, Part II
Cham : Springer Nature Switzerland : Imprint: Springer, 2024Table of Contents: “…. -- Defending the Digital Frontier URL-based Phishing Detection Extension. -- Guarding the Digital Frontier: A Logistic Regression Approach to Malware Detection. -- Hybrid Efficient IDS Against Adversarial Attacks in IoT Networks. -- Data Analytics. -- Real-Time Soil Moisture Sensing using Arduino for Automated Plant Irrigation System. -- Campus Placement and Salary Prediction: Leveraging Machine Learning for Enhanced Employability. -- Exploring Corrosion Detection: Deep Learning and Ensemble Approaches Analysis. -- Comic Generation using AI - A Review. -- Residential Price Analysis Using Machine Learning. -- AI-Driven Interviewer: Enhancing Interview Experience Through Conversational AI. -- Human Abnormal Activity Detection. -- Campus Drive Portal on Career Advancement for College Students. -- Deception Detection using Random Forest and KNN. -- Analyzing Meteorological Data for Curated Music Selection. -- Remote and Centralized Billing System using Cloud Computing. -- Information Extraction using RPA and Generative AI from Unstructured Documents: A case of Invoices. -- Harnessing Machine Learning-Based Classification Techniques to Optimize Crop and Fertilizer Recommendations. -- Cyberbullying Predictive Analysis on Twitter data with Multi-Model Supervised Technique. -- Heart Attack Prediction Using Big Data Analytics. -- Bloom’s Taxonomy based Question Analysis for Personalized Learning. -- Snowfall Forecasting with Enhanced Accuracy: Leveraging Multi-Class SVM for Meteorological Predictions. .…”
1st ed. 2024.
Format: Electronic eBookFull text (Wentworth users only)
Full text (Wentworth users only)
-
184
Mobile application security
New York : McGraw-Hill, 2010Table of Contents: “…Strict Use and Enforcement of SSL -- Phishing -- Cross-Site Request Forgery (CSRF) -- Location Privacy/Security -- Insecure Device Drivers -- Multifactor Authentication -- Tips for Secure Mobile Application Development -- Leverage TLS/SSL -- Follow Secure Programming Practices -- Validate Input -- Leverage the Permissions Model Used by the OS -- Use the Least Privilege Model for System Access -- Store Sensitive Information Properly -- Sign the Application's Code -- Figure Out a Secure and Strong Update Process -- Understand the Mobile Browser's Security Strengths and Limitations…”
Format: Electronic eBookFull text (Wentworth users only)
-
185
Towards new e-Infrastructure and e-Services for Developing Countries 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings
Cham : Springer Nature Switzerland : Imprint: Springer, 2023Table of Contents: “…E-infrastructure: Centrality Based Algorithms for Controller Placements in Software Defined Wide Area Networks -- Modelling and multi-agent simulation of urban road network -- A Fuzzy logic based routing protocol to improve WSN performances -- A lightweight and robust dynamic authentication system for smarthome -- Anchor-Free Localization Algorithm using Controllers in Wireless Sensors Networks -- Assessing the Impact of DNS Configuration on Low Bandwidth Networks -- Mathematical Analysis of DDoS Attacks in SDN-based 5G -- A 5G-enabled e-infrastructure for multipoint video conferencing in higher education institutions of Burkina Faso -- E-Services (Farming): 9 Virtual Fences: A Systematic Literature Review -- A four steps approach using digital technologies to deliver tailored farming practices to small-scale farmers: The case of smallholders cacao and coee farmers in the Ngounie region in Gabon -- Disjoint Routing Algorithms : A Systematic Literature Review -- Construction of a core ontology of endogenous knowledge on agricultural techniques: OntoEndo -- An architecture of a Data Lake for the Sharing, Agricultural Knowledge in Burkina Faso -- E-Services (Health): Deciphering Barriers and Facilitators of eHealth Adoption in Uganda using the Systems Thinking Approach - A Systematic Review -- Barriers and Facilitators of eHealth Adoption among Patients in Uganda – A Quantitative Study -- Survey of Detection and Identification of black Skin Diseases Based on Machine Learning -- Rebuilding Kenya’s Rural Internet Access from the COVID-19 Pandemic -- Assessing personal perceptions of privacy and data protection among local residents with regard to the use of Unmanned Aerial Vehicles for humanitarian intervention: case study Malawi -- E-Services (Social): Community Networks in Kenya: Characteristics and Challenges -- Cybercrime Victimization: Experiences and Multi-stage Recommendations from a Survey in Cameroon -- E-Services (Education): Review of Federated Learning: Algorithms, Frameworks & Applications -- Intelligent Tutoring System to Learn the Transcription of Polysemous Words in Mooré -- Advanced ICT: Assessing the Quality of Acquired Images to Improve Ear Recognition for Children -- Autonomous Electromagnetic Signal Analysis and Measurement System -- Digital Transformation of Textile and Fashion Design Industry in the Global South: A Scoping Review -- Electrical Big Data ’s stream management for Efficient energy control -- Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon -- Software vulnerabilities detection using a trace-based analysis model -- Subscription Fraud Prevention in Telecommunication Using Multimodal Biometric System -- Use of Artificial Intelligence in cardiology: Where are we in Africa? …”
1st ed. 2023.
Format: Electronic eBookFull text (Wentworth users only)
-
186
Penetration Testing with Raspberry Pi - Second Edition.
Birmingham : Packt Publishing, 2016Table of Contents: “…Chapter 5: Taking Action -- Intrude and Exploit Using the Metasploit framework to exploit targets; Getting Recon data into Metasploit; Scoping vectors and launching attacks; Rolling our own exploits; Wrapping payloads; Social engineering; The Social-Engineer Toolkit; Phishing with BeEF; Executing man-in-the-middle attacks; SSLstrip; parasite6; Manipulating data; Sniffing the network in Scapy; Writing/reading PCAP files; Creating/sending/receiving of packets; Creating and sending malformed packets; TCP SYN scan; Rogue Access honeypot (revising and re-shooting); Easy-creds; Bluetooth testing.…”
2nd ed.
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
187
Computers, Privacy and Data Protection: an Element of Choice
Dordrecht : Springer Netherlands, 2011Table of Contents: “…The envisaged European model of analyzing flight passenger data -- Chapter 9 Options for securing PCs against phishing and espionage. A report from the EU-project "Open Trusted Computing"; Arnd Weber and Dirk Weber -- Part 3 Privacy Practices as Vectors of Reflection -- Chapter 10 Keeping up appearances: Audience segregation in social network sites; Bibi Van den Berg and Ronald Leenes -- Chapter 11 Avatars out of Control. …”
Format: Electronic eBookFull text (Wentworth users only).
-
188
Data Management, Analytics and Innovation Proceedings of ICDMAI 2019, Volume 2
Singapore : Springer Singapore : Imprint: Springer, 2020Table of Contents: “…Sequence Mining Based Support Vector Machine with Decision Tree Approach for Efficient Time Series Data Classification -- Identifying Phishing through Web Content and addressed Bar-Based Features -- A Unified Framework for Outfit Design and Advice -- Contextual Relevance of ICT-Call Modules and its Role in Promoting Employability Skills among Engineering Students - A Study -- A Clinically Applicable Automated Risk Classification model for Pulmonary Nodules -- A Generalized Ensemble Machine Learning Approach for Landslide Susceptibility Modeling -- Comparative evaluation of AVIRIS-NG and Hyperion hyperspectral image for mineral identification -- Real-Time Scheduling Approach for IoT based Home Automation System -- Floating car data map-matching utilizing Dijkstra algorithm -- Calculating AQI using Secondary Pollutants for Smart Air Management System -- Enhanced Prediction of Heart Disease using Particle Swarm Optimization and Rough Sets with Transductive Support Vector Machines Classifier -- DataCan: Robust approach for Genome Cancer Data Analysis -- DataAutism: An Early Detection Framework of Autism in Infants using Data Science -- AnaBus: A Proposed Sampling Retrieval Model for Business and Historical Data Analytics -- Abrupt Scene Change Detection using block based Local Directional Pattern -- A FRAMEWORK FOR WEB ARCHIVING AND GUARANTEED RETRIEVAL -- Business Intelligence through Big Data Analytics, Data Mining and Machine Learning -- The Effect of Big Data on the Quality of Decision-Making in Abu Dhabi Government Organisations -- The Impact of Technology Readiness on the Big Data Adoption among UAE Organizations -- Sports Data Analytics : A Case Study of Off-field Behavior of Players using Statistical Approach -- Phrase Based Information Retrieval Analysis in Various Search Engines Using Machine Learning Algorithms -- The Politics of Artificial Intelligence Behaviour and Human Rights Violation Issues in 2016 US Presidential Elections: An Appraisal -- Crop Prediction Using Artificial Neural Network and Support Vector Machine -- A Hybrid and Adaptive Approach for Classification of Indian Stock Market Related Tweets -- Generative Adversarial Networks as an Advancement in 2D to 3D Reconstruction Techniques -- Impact of Artificial Intelligence on Human Resources -- Role of Activation functions and order of input sequences in Question-Answering -- GestTalk — RealTime Gesture to Speech Conversion Glove -- Deep Learning Algorithms for Accurate Prediction of Image Description for E-Commerce Industry -- Taj-Shanvi framework for image fusion using Guided Filters -- Effective Classification & Handling of Incoming Data Packets in Mobile Adhoc Networks (MANETs) using Random Forest Ensemble Technique (RF/ET) -- Community Structure Identification in Social Networks Inspired By Parliamentary Political Competitions -- An Integrated Technique to Ensure Confidentiality and Integrity in Data Transmission through the Strongest and Authentic Hotspot Selection Mechanism -- ML Model to Improve QoS for selection of healthy channel in Wireless Sensor Network -- Performance Analysis of the Mobile WSN for Efficient localization.…”
1st ed. 2020.
Format: Electronic eBookFull text (Wentworth users only)
Full text (Wentworth users only)
-
189
Science of Cyber Security 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers
Cham : Springer International Publishing : Imprint: Springer, 2022Table of Contents: “…-- Design of End-to-End Security for MQTT 5.0 -- DroidFP: A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit -- System and Web Security -- An Intrusion Detection System based on Deep Belief Networks -- HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains -- AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series -- BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment -- Multi-region SRAM-Based TCAM for Longest Prefix -- Security in Financial Industry -- A solution for the offline double-spending issue of digital currencies -- A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices -- Social Engineering and Personalized Security -- Cyber Social Engineering Kill Chain -- Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects -- Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement -- Privacy and Anonymity -- TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps -- A k-anonymity-based Robust Watermarking Scheme for Relational Database.…”
1st ed. 2022.
Format: Electronic eBookFull text (Wentworth users only)
-
190
Degunking your email, spam, and viruses
Scottsdale, Ariz. : Paraglyph Press, 2004Table of Contents: “…-- Avoid the Nigerian 419 Scams -- Don't Be Victim to Identity Theft Because of Phishing Expeditions -- The New Scourge of the Internet -- Impersonating a Web Site -- "Bait and Switch" Web Links -- How Not to Get Hooked -- Degunking After a Malware Attack -- Understand the Five PC Defense Conditions -- Was It Really Malware? …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
191
Proceeding of International Conference on Computational Science and Applications ICCSA 2019
Singapore : Springer Singapore : Imprint: Springer, 2020Table of Contents: “…Empathic Diary based on Emotion Recognition using Convolutional Neural Network -- Detection of Ransomware attack: A Review -- Room Service Robot -- Comparative Analysis For An Optimized Data Driven System -- Fake Email & Spam Detection: User Feedback with Naives Bayesian Approach -- C-ASFT: Convolutional Neural Networks based Anti-Spam Filtering Technique -- Cognitive Control of Robotic-Rehabilitation Device using Emotiv EEG Headset -- Non-Stationary Data Stream Analysis: State-of-Art Challenges and Solutions -- Parallel Job Execution To Minimise Overall Execution Time And Individual Schedule Time Using Modified Credit Based Firefly Algorithm -- Novel Non-Invasive Approach for Diagnosis of Medical Disorders based on De Broglie’s Matter Waves & Water Memory -- Tamper Detection in Cassandra and Redis Database- A Comparative Study -- Tamper Detection In MongoDB And CouchDB Database -- Recommender System in eLearning: A Survey -- A Realistic Mathematical Approach for Academic Feedback Analysis System -- Fake News classification on Twitter using Flume, N-gram analysis and Decision Tree machine learning technique -- Swarm Intelligence Based Systems: A Review -- Internet of Things: A Survey on Distributed Attack Detection using Deep Learning Approach -- Precise Orbit and Clock Estimation of Navigational Satellite using Extended Kalman Filter Applicable to IRNSS NavIC Receiver Data -- Effects of Color on Visual Aesthetics Sense -- Performance Evaluation of Video Segmentation Metrics -- Suspicious Activity Detection Using Live Video Analysis -- A Review on Using Dental Images as A Screening Tool for Osteoporosis -- An expert diagnosis system for Parkinson's disease using Bagging based Ensemble of Polynomial Kernel SVMs with Improved GA-SVM Features Selection -- Case Study: Use of AWS Lambda for Building a Serverless Chat Application -- Detection and Classification of Diabetic Retinopathy Using Alex Net architecture of Convolutional Neural Networks -- Contextual Recommendation and Summary of Enterprise Communication -- Cybersecurity and Communication Performance Improvement of Industrial-IoT Network Towards Success of Machine Visioned IR 4.0 Technology -- Dynamic Load Balancing in Software Defined Networks using Machine Learning -- Analysis and Comparison of Timbral Audio Descriptors with Traditional Audio Descriptors Used in Automatic Tabla Bol Identification of North Indian Classical Music -- Sentiment Analysis on Aadhaar for Twitter Data – A Hybrid Classification Approach -- Song Recommendation System Using Hybrid approach -- Arrhythmia Detection using ECG Signal: A Survey -- Towards Designing the Best Model for Classification of Fish Species using Deep Neural Networks -- A Study on Attribute Based Predictive Modelling for Personal Systems & Components A Machine Learning & Deep Learning Based Predictive Framework -- Text Categorization Using Sentiment Analysis -- Automated Real Time E-mail Classification System based on Machine Learning -- Smart Detection Of Parking Rates And Determining The Occupancy -- Deep Learning-based Approach to classify Praise’s or Complaint’s from Customer Reviews -- Psychological Behavioral Analysis of Defaulter Students -- TNM Cancer Stage Detection from Unstructured Pathology Reports of Breast Cancer Patients -- Restructuring of Object Oriented Software System using Clustering Techniques -- Analysis of System Logs for Pattern Detection and Anomaly Prediction -- Phishing Detection: Malicious and Benign Websites Classification using Machine Learning Techniques -- Automation of Paper Setting and Identification of Difficulty Level of Questions and Question Papers.…”
1st ed. 2020.
Format: Electronic eBookFull text (Wentworth users only)
-
192
Information security management handbook
Boca Raton, Fl : Auerbach, 2003Table of Contents: “…chapter 1 Sensitive or Critical Data Access Controls -- chapter 2 An Introduction to Role-Based Access Control -- chapter 3 Smart Cards -- chapter 4 A Guide to Evaluating Tokens -- chapter 5 Identity Management: Benefits and Challenges -- chapter 6 An Examination of Firewall Architectures -- chapter 7 The Five W’s and Designing a Secure, Identity-Based, Self-Defending Network (5W Network) -- chapter 8 Maintaining Network Security: Availability via Intelligent Agents -- chapter 9 PBX Firewalls: Closing the Back Door -- chapter 10 Voice over WLAN -- chapter 11 Spam Wars: How To Deal with Junk E-Mail -- chapter 12 Auditing the Telephony System: Defenses against Communications Security Breaches and Toll Fraud -- chapter 13 The Controls Matrix -- chapter 14 Information Security Governance -- chapter 15 Belts and Suspenders: Diversity in Information Technology Security -- chapter 16 Building Management Commitment through Security Councils, or Security Council Critical Success Factors -- chapter 17 Developing and Conducting a Security Test and Evaluation -- chapter 18 Enterprise Security Management Program -- chapter 19 Technology Convergence and Security: A Simplified Risk Management Model -- chapter 20 People, Processes, and Technology: A Winning Combination -- chapter 21 Building an Effective Privacy Program -- chapter 22 Training Employees To Identify Potential Fraud and How To Encourage Them To Come Forward -- chapter 23 Beyond Information Security Awareness Training: It Is Time To Change the Culture -- chapter 24 Establishing a Successful Security Awareness Program -- chapter 25 System Development Security Methodology -- chapter 26 Software Engineering Institute Capability Maturity Model -- chapter 27 Organized Crime and Malware -- chapter 28 Enabling Safer Deployment of Internet Mobile Code Technologies -- chapter 29 Blind Detection of Steganographic Content in Digital Images Using Cellular Automata -- chapter 30 An Overview of Quantum Cryptography -- chapter 31 Elliptic Curve Cryptography: Delivering High-Performance Security for E-Commerce and Communications -- chapter 32 Enterprise Assurance: A Framework Explored -- chapter 33 Managing Unmanaged Systems -- chapter 34 Understanding Service Level Agreements -- chapter 35 Building Maintenance Processes for Business Continuity Plans -- chapter 36 Identifying Critical Business Functions -- chapter 37 Selecting the Right Business Continuity Strategy -- chapter 38 Contingency at a Glance -- chapter 39 The Business Impact Assessment Process and the Importance of Using Business Process Mapping -- chapter 40 How To Test Business Continuity and Disaster Recovery Plans and How Often -- chapter 41 Sarbanes–Oxley Compliance: A Technology Practitioner’s Guide -- chapter 42 Health Insurance Portability and Accountability Act Security Rule -- chapter 43 The Ethical and Legal Concerns of Spyware -- chapter 44 The Evolution of the Sploit -- chapter 45 Computer Crime -- chapter 46 Phishing: A New Twist to an Old Game -- chapter 47 It’s All about Power: Information Warfare Tactics by Terrorists, Activists, and Miscreants -- chapter 48 DCSA: A Practical Approach to Digital Crime Scene Analysis -- chapter 49 What a Computer Security Professional Needs To Know about E-Discovery and Digital Forensics -- chapter 50 How To Begin a Non-Liturgical Forensic Examination -- chapter 51 Physical Security for Mission-Critical Facilities and Data Centers.…”
Fifth edition.
Format: Electronic eBookFull text (WIT users only)
-
193
Network and System Security 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings
Cham : Springer Nature Switzerland : Imprint: Springer, 2022Table of Contents: “…AI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps’ Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack.…”
1st ed. 2022.
Format: Electronic eBookFull text (Wentworth users only)
-
194
Intelligent Computing, Communication and Devices Proceedings of ICCD 2014, Volume 1.
Dordrecht : Springer, 2014Table of Contents: “…2.1 The Conventional PID Controller2.2 The Adaptive PID Controller; 2.3 GA-Optimized APID; 2.3.1 Objective Function of the Genetic Algorithm; 2.3.2 Different Operations Used in GA; 3...Results; 4...Conclusion; References; 8 Text Mining for Phishing E-mail Detection; Abstract; 1...Introduction; 2...Related Work; 3...Proposed Methodology; 3.1 Data set Preparation; 3.2 Feature Extraction Using Text Mining; 3.3 Feature Selection; 3.4 Classification; 4...Implementation; 5...Conclusion; References; 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment…”
Format: Electronic eBookFull text (Wentworth users only)
-
195
Contemporary topics in finance : a collection of literature surveys
Hoboken, NJ : John Wiley & Sons, Inc., 2019Table of Contents: “…Financial Identity Scams: Phishing, Pharming and Payment Scams; 4. Fraudulent Financial Mis-Selling; 4.1. …”
Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
196
American countercultures : an encyclopedia of nonconformists, alternative lifestyles, and radical ideas in U.S. history
Armonk, N.Y. : Sharpe Reference, 2009Table of Contents: “…. -- Oberlin College -- O'Brien, Fitz-James -- Ochs, Phil -- O'Keeffe, Georgia -- Omphalism -- Oneida Community -- O'Neill, Eugene -- Onion, the -- Organic farming -- Outsider art -- Outsider music -- Owen, Robert Dale -- Pacifica Radio -- Pacifism -- Palahniuk, Chuck -- Palmer, Phoebe -- Patchen, Kenneth -- Peace and Freedom Party -- Pentecostalism -- People for the Ethical Treatment of Animals -- Peoples Temple -- Perfectionist Movement -- Performance art -- Performance Space 122 -- Peter, Paul and Mary -- Peyote -- Pfaff's Cellar -- Phish -- Physical culture movement -- Pilgrims -- Pinero, Miguel -- Pirate Radio -- Pirsig, Robert M. -- Poe, Edgar Allan -- Polar Bear clubs -- Pop, Iggy -- Pop Art -- Populism -- Pornography -- Poster art -- Pound, Ezra -- Presley, Elvis -- Presses, Small Book -- Priestley, Joseph -- Prohibition -- Provincetown Players -- Pryor, Richard -- Pseudoscience -- Psychedelia -- Psychobilly -- Public Enemy -- Pulp Fiction -- Punk Rock -- Puritans -- Purple, Adam -- Pynchon, Thomas -- Quakers -- Queer Nation.…”
Format: Book
This item is not available through FLO. Please contact your home library for further assistance. -
197
New media and public relations
New York : Peter Lang, 2007Table of Contents: “…Dutta, Mahuya Pal -- The determination of the success of organizational relationship management through network structure: the Attac case / Romy Frohlich, Jeffrey Wimmer -- Creating a dream, changing reality: a Brazilian web site as a public relations tool for social change / Maria de Fatima Oliveira -- Engendering the Arabic internet: modern challenges in the information society / Mahmoud Eid -- Fraud talk : how banks use online efforts to fight phishing / Cassandra Imfeld, Glenn W. Scott, Glen Feighery -- Public relations meets marketing online: an exploratory study of Biotech small- to medium-sized enterprises / Calin Gurau -- Building the nonprofit organization-donor relationship online: the increasing importance of e-philanthrophy / Richard D. …”
Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
198
Applied Technologies 4th International Conference, ICAT 2022, Quito, Ecuador, November 23–25, 2022, Revised Selected Papers, Part I
Cham : Springer Nature Switzerland : Imprint: Springer, 2023Table of Contents: “…Ecuador’s case study -- Image processing method to estimate water quality parameter -- Use of the Student Engagement as a strategy to optimize online education, applying a supervised machine learning model using facial recognition -- Crime Data Analysis Using Machine Learning Models -- Machine Vision -- Gene therapy as a solution to genetic diseases through DNA manipulation -- Security -- Vulnerability of CAPTCHA systems using bots with machine vision skills -- Military Leadership in the Ecuadorian Army -- Analysis of key variables for Ecuadorian defense industry development -- The prioritization of external security as a means of guaranteeing multidimensional security and economic growth -- Comparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages -- Ground Robot for Research and Rescue Management -- A virtual shooting range, experimental study for military training -- Recovery of Level III Ballistic Plates by reinforcing and renewing their structural components -- Technology Trends -- A Blockchain-Based Model for OAuth Authorization via Third-Party Web Application -- A blockchain-based prototype to support the medical prescription control -- Identification system based on facial recognition services in the cloud -- ESPE-Chat: An inclusive application for people with hearing impairment -- IoT for energy saving in homes in Santo Domingo de los Tsáchilas -- Monitoring system based on an IOT platform for an axial flow permanent magnet generator -- Cyber-Physical Systems in Education: A New Approach to Continuous Improvement and Agile Learning -- Open-source platform for development of taximeters: Adjustment Software -- XiMent: Multiplatform cognitive training system based on multimedia technologies and Reminiscence methodology for the population of older adults with mild cognitive impairment -- A dataset for analysis of quality code and toxic comments -- Model-Driven Engineering Applied to User Interfaces. …”
1st ed. 2023.
Format: Electronic eBookFull text (Wentworth users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
199
Data Science and Emerging Technologies Proceedings of DaSET 2022
Singapore : Springer Nature Singapore : Imprint: Springer, 2023Table of Contents: “…Part I: Artificial Intelligence -- Extractive Text Summarization Using Syntactic Sub- Graph Models -- Analysis of Big Five Personality Factors to determine the Appropriate Type of Career using the C4.5 Algorithm -- Predicting Disaster Type from Social Media Imagery via Deep Neural Networks Directed by Visual Attention -- Dissemination Management for Official Statistics Using Artificial Intelligence-Based Media Monitoring -- Part II: Computational Vision -- A Naive but Effective Post-Processing Approach for Dark Channel Prior (DCP) -- COVID-19 Face Mask Classification Using Deep Learning -- Gender Classification Using Transfer Learning and Fine-Tuning -- Multi-Language Recognition Translator by Using the Convolutional Neural Network (CNN) Algorithm and Optical Character Recognition (OCR) -- Autonomous Driving Through Road Segmentation Based on Computer Vision Techniques -- Part III: Cybersecurity -- Phishing Attack Types and Mitigation: A Survey -- A Review of Privacy Protection Methods for Smart Homes Against Wireless Snooping Attack -- Development of Graph-Based Knowledge on Ransom-Ware Attacks Using Twitter Data -- Part IV: Big Data Analytics -- BigMDHealth: Supporting Multidimensional Big Data Management and Analytics over Big Healthcare Data via Effective and Efficient Multidimensional Aggregate Queries over Key-Value Stores (Prof Alredo's paper) -- Design and Implementation of Data Warehouse Solution at Kumpulan Wang Persaraan (KWAP) -- Consumer Behavior Prediction During Covid-19 Pandemic Conditions Using Sentiment Analytics -- Big Data Application on Prediction of HDD Manufacturing Process Performance -- Visualising Economic Situation Through Malaysia Economic Recovery Dashboard (MERD) -- Part V: Machine/Deep Learning -- Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning -- Plant Growth Phase Classification Using Deep Neural Network -- The Implementation of Genetic Algorithm-Ensemble Learning on QSAR Study of Diacylglycerol Acyltransferase-1(DGAT1) Inhibitors as Anti-Diabetes -- Classification of Exercise Game Data for Rehabilitation Using Machine Learning Algorithms -- SDDLA: A New Architecture for Secured Decentralized Distributed Learning -- Gated Memory Unit: A Novel Recurrent Neural Network Architecture for Sequential Analysis -- Multi-Class Classification for Breast Cancer with High Dimensional Microarray Data Using Machine Learning Classifier -- Predicting Risks of Late Delivery to Online Shopping Customers Using Machine Learning Techniques -- Quora Insincere Questions Classification Using Attention Based Model -- Suicide Ideation Detection: A Comparative Study of Sequential and Transformer Hybrid Algorithms -- Well Log Data Preparation and Effective Utilization of Drilling Parameters Using Data Science Based Approaches -- Deep Learning-Based Approach for Classifying the Severity of Metal Corrosion Using SEM Images -- Insurance Risk Prediction Using Machine Learning -- Loan Default Forecasting Using StackNet -- Part VI: Statistical Learning -- Neural Network Autoregressive Model for Forecasting Malaysia Under-5 Mortality -- Robustness of Support Vector Regression and Random Forest Models: A Simulation Study -- The Impact of Restrictions Community Activities on COVID-19 Transmission: A Case Study in Sumatra Island, Indonesia -- Predicting Internet Usage for Digital Finance Services: Multitarget Classification Using Vector Generalized Additive Model with SMOTE-NC -- Part VII: Text Mining and Classification -- Identifying Topic Modeling Technique in Evaluating Textual Datasets -- Y-X-Y Encoding for Identifying Types of Sentence Similarity -- Evaluation of Extractive and Abstract Methods in Text Summarization.…”
1st ed. 2023.
Format: Electronic eBookFull text (Wentworth users only)
-
200
Research Challenges in Information Science: Information Science and the Connected World 17th International Conference, RCIS 2023, Corfu, Greece, May 23–26, 2023, Proceedings
Cham : Springer Nature Switzerland : Imprint: Springer, 2023Table of Contents: “…-Online-Notes System: Real-time speech recognition and translation of lectures -- Temporal relation extraction from clinical texts using knowledge graphs -- Domain TILEs: Test Informed Learning with Examples from the Testing Domain -- Using GUI change detection for delta testing -- Enterprise Modeling for Machine Learning: Case-based Analysis and Initial Framework Proposal -- Towards Creating a Secure Framework for Building Mirror World Applications -- Towards a Secure and Privacy compliant Framework for Educational Data Mining -- Internet of Cloud (IoC): The need of raising privacy and security awareness -- Comparative study of unsupervised keyword extraction methods for job recommendation in an industrial environment -- A Meta-model for Digital Business Ecosystem Design -- Students in Team-Based Software Development Projects: An Exploratory Study -- Ontology of Product Provenance for Value Networks -- A Data Value Matrix: Linking FAIR Data with Business Models -- An Information Privacy Competency Model for Online Consumers -- DECENT: A Domain Specific Language to Design Governance Decisions -- Doctoral Consortium papers -- Business User-oriented Recommender System of Data -- Secure infrastructure for cyber-physical ranges -- Guidelines for Developers and Recommendations for Users to Mitigate Phishing Attacks: An Interdisciplinary Research Approach -- Leveraging Exogeneous Data for the Predictive Monitoring of IT Service Management Processes -- Predicting privacy decisions in mobile applications and raising users’ privacy awareness -- Information overload: Coping mechanisms and tools impact.…”
1st ed. 2023.
Format: Electronic eBookFull text (Wentworth users only)