You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed de...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The...
It was 1999 when Extreme Programming Explained was ?rst published, making this year's event arguably the ?fth anniversary of the birth of the XP/Agile movement in software development. Our fourth conference re?ected the evolution and the learning that have occurred in these exciting ?ve years as agile practices have become part of the mainstream in software development. These pages are the proceedingsof XP Agile Universe 2004, held in beautiful Calgary, gateway to the Canadian Rockies, in Alberta, Canada. Evidentintheconferenceis thefactthatourlearningis still inits earlystages. While at times overlooked,adaptation has beena core principleof agile software development since the earliest lite...
This book constitutes the refereed proceedings of the Third International Symposium on End-User Development, IS-EUD 2011, held in Torre Canne, Italy, in June 2011. The 14 long papers and 21 short papers presented were carefully reviewed and selected for inclusion in the book. In addition the volume contains 2 keynote speeches, 14 doctoral consortia, and information on 3 workshops. The contributions are organized in topical sections on mashups, frameworks, users as co-designers, infrastructures, methodologies and guidelines, beyond the desktop, end-user development in the workplace, meta-design, and supporting end-user developers.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Extreme Programming has come a long way since its ?rst use in the C3 project almost 10 years ago. Agile methods have found their way into the mainstream, and at the end of last year we saw the second edition of Kent Beck’s book on Extreme Programming, containing a major refactoring of XP. This year, the 6th International Conference on Extreme Programming and Agile Processes in Software Engineering took place June 18–23 in She?eld. As in the yearsbefore, XP 2005provideda unique forum for industry and academic professionals to discuss their needs and ideas on Extreme Programming and - ile methodologies. These proceedings re?ect the activities during the conference which ranged from present...
This book constitutes the refereed proceedings of the 7th International Conference on Product-Focused Software Process Improvement, PROFES 2006, held in Amsterdam, June 2006. The volume presents 26 revised full papers and 12 revised short papers together with 6 reports on workshops and tutorials. The papers constitute a balanced mix of academic and industrial aspects, organized in topical sections on decision support, embedded software and system development, measurement, process improvement, and more.
This is an open access book. The 2nd International Conference on Emerging Trends in Engineering (ICETE 2023) will be held in-person from April 28-30, 2023 at University College of Engineering, Osmania University, Hyderabad, India. Since its inception in 2019, The International Conference on Emerging Trends in Engineering (ICETE) has established to enhance the information exchange of theoretical research and practical advancements at national and international levels in the fields of Bio-Medical, Civil, Computer Science, Electrical, Electronics & Communication Engineering, Mechanical and Mining Engineering. This encourages and promotes professional interaction among students, scholars, resear...
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.