Browsing by Subject Computer networks

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 8 of 8
  • TVS.005273_TT_(IEEE Press Series on Networks and Service Management) Jingguo Ge, Tong Li, Yulei Wu - AI and Machine Learning for Network and Security.pdf.jpg
  • Sách/Book


  • Authors: Wu, Yulei (2023)

  • AI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.

  • TVS.005119_TT_Fei Hu, Xiali Hei - AI, Machine Learning and Deep Learning_ A Security Perspective-CRC Press (2023).pdf.jpg
  • Sách/Book


  • Authors: Hu, Fei (2023)

  • Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use

  • TVS.005240_TT_Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot - Data Exfiltration Threats and Prevention Techniques_ Machine Learning and.pdf.jpg
  • Sách/Book


  • Authors: Tari, Zahir (2023)

  • Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the f...

  • TVS.005106_TT_(The Elsevier And Miccai Society Book Series) Haofu Liao, S. Kevin Zhou, Jiebo Luo - Deep Network Design for Medical Image Computing. Pr.pdf.jpg
  • Sách/Book


  • Authors: Liao, Haofu (2022)

  • Deep Network Design for Medical Image Computing: Principles and Applications covers a range of MIC tasks and discusses design principles of these tasks for deep learning approaches in medicine. These include skin disease classification, vertebrae identification and localization, cardiac ultrasound image segmentation, 2D/3D medical image registration for intervention, metal artifact reduction, sparse-view artifact reduction, etc.

  • TVS.005248_TT_Shaurya Gupta, Kanta Prasad Sharma, Ashish Sharma, Dac-Nhuong Le - Evolving Networking Technologies_ Developments and Future Directions-.pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication

  • TVS.005101_TT_Ting He, Liang Ma, Ananthram Swami, Don Towsley - Network Tomography_ Identifiability, Measurement Design, and Network State Inference-C.pdf.jpg
  • Sách/Book


  • Authors: He, Ting (2021)

  • It describes the main types of mathematical problems, along with their solutions and properties, and emphasizes the actions that can be taken to improve the accuracy of network tomography. With proofs and derivations introduced in an accessible language for easy understanding, this is an essential resource for professional engineers, academic researchers, and graduate students in network management and network science.

  • TVS.005102_TT_Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg - Research Advances in Network Technologies-CRC Press (2023).pdf.jpg
  • Sách/Book


  • Authors: Verma, Anshul (2023)

  • In current digital era, information is an important asset for our daily life as well as for small and large-scale businesses. The network technologies are the main enablers that connect the computing devices and resources together to collect, process and share the vital information locally as well as globally. The network technologies provide efficient, flexible and seamless communication while maximizing productivity and resources for our day-to-day life and business operations