Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23)

Proceedings of the 2023 International Conference on Advances in Computing Research (ACR’23)

Author: Kevin Daimi

Publisher: Springer Nature

Published: 2023-05-26

Total Pages: 670

ISBN-13: 3031337433

DOWNLOAD EBOOK

This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing.


Cutting Edge Applications of Computational Intelligence Tools and Techniques

Cutting Edge Applications of Computational Intelligence Tools and Techniques

Author: Kevin Daimi

Publisher: Springer Nature

Published: 2023-11-30

Total Pages: 355

ISBN-13: 3031441273

DOWNLOAD EBOOK

The book delivers an excellent professional development resource for educators and practitioners on the cutting-edge computational intelligence techniques and applications. It covers many areas and topics of computational intelligence techniques and applications proposed by computational intelligence experts and researchers and furthers the enhancement of the community outreach and engagement component of computational intelligence techniques and applications. Furthermore, it presents a rich collection of manuscripts in highly regarded computational intelligence techniques and applications topics that have been creatively compiled. Computers are capable of learning from data and observations and providing solutions to real-life complex problems, following the same reasoning approach of human experts in various fields. This book endows a rich collection of applications in widespread areas. Among the areas addressed in this book are Computational Intelligence Principles and Techniques; CI in Manufacturing, Engineering, and Industry; CI in Recognition and Processing; CI in Robotics and Automation; CI in Communications and Networking; CI in Traditional Vehicles, Electric Vehicles, and Autonomous Vehicles; CI in Smart Cities and Smart Energy Systems; and CI in Finance, Business, Economics, and Education. These areas span many topics including repetitive manufacturing, discrete manufacturing, process manufacturing, electronic systems, speech recognition, pattern recognition, signal processing, image processing, industrial monitoring, vision systems for automation and robotics, cooperative and network robotics, perception, planning, control, urban traffic networks control, vehicle-to-roadside communications, smart buildings, smart urbanism, smart infrastructure, smart connected communities, smart energy, security, arts, and music.


Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23)

Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23)

Author: Kevin Daimi

Publisher:

Published: 2023

Total Pages: 0

ISBN-13: 9783031337444

DOWNLOAD EBOOK

This book includes recent research on Data Science, IoT, Smart Cities and Smart Energy, Health Informatics, and Network Security. The International Conference on Advances in Computing Research (ACR'23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the advances in computing technologies. The conference is aptly segmented into six tracks to promote a birds-of-the-same-feather congregation and maximize participation. The first track covers computational intelligence, which include, among others, research topics on artificial intelligence, knowledge representation and management, application and theory of neural systems, fuzzy and expert systems, and genetic algorithms. The second track focuses on cybersecurity engineering. It includes pertinent topics such as incident response, hardware and network security, digital biometrics and forensics technologies, and cybersecurity metrics and assessment. Further, it features emerging security technologies and high-tech systems security. The third track includes studies on data analytics. It covers topics such as data management, statistical and deep analytics, semantics and time series analytics, and a multitude of important applications of data analytics in areas such as engineering, health care, business, and manufacturing. The fourth track on network and communications covers a wide range of topics in both areas including protocols and operations, ubiquitous networks, ad hoc and sensor networks, cellular systems, virtual and augmented reality streaming, information centric networks, and the emerging areas in connected and autonomous vehicle communications. Lastly, the final track on cloud and mobile computing includes areas of interest in cloud computing such as infrastructure, service, management and operations, architecture, and interoperability and federation. This track also includes important topics in mobile computing such as services and applications, communication architectures, positioning and tracking technologies, the general applications of mobile computing. .


Theoretical Framework

Theoretical Framework

Author: Nyla Marie Keith

Publisher: Independently Published

Published: 2020-12-14

Total Pages: 70

ISBN-13:

DOWNLOAD EBOOK

Theoretical Framework: Social Media Dependency Disorder was written as a testament to ten years of research and advocating for Social Media Awareness. With this book, we at The Global Touch Foundation hope to educate Social Media users around the world about Social Media Dependency Disorder. Education is the first step to finding solutions and bringing to light what may be at the root of depression and anxiety sufferers. Too long has there been a lack of regulations and research on the potential psychological effects of constant Social Media Usage. In this book, we cover topics such as Cyber-Psychoanalysis, The Third Persona, and Disability Inclusion. After reading this, you will understand how Social Media has the potential to affect you and your family psychologically and biologically, how to identify symptoms of social media dependency disorder, and how you can help someone that is suffering. As a society, we have come a long way with our technological innovations. Let us continue our progress by learning how to post responsibly, and make our virtual worlds safer for our mental health.


The CERT Guide to Insider Threats

The CERT Guide to Insider Threats

Author: Dawn M. Cappelli

Publisher: Addison-Wesley

Published: 2012-01-20

Total Pages: 431

ISBN-13: 013290604X

DOWNLOAD EBOOK

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book’s security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks.


Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W. Probst

Publisher: Springer Science & Business Media

Published: 2010-07-28

Total Pages: 248

ISBN-13: 1441971335

DOWNLOAD EBOOK

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.