Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also walks the reader through how to recognize and counter common hacking activities. The textbook bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources, like classroom presentation slides, sample review, test and exam questions, practice exercises to make the material contained within even more practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.
This is followed by a detailed discussion on how an intelligent system can independently monitor and learn from an event, and invite human input when necessary.
H. Ren, and G. Xu, “Human Action Recognition in Smart Classroom”, IEEE Proc. ... 1478–1497, 2001 A. Hampapur, L. Brown, J. Connell, S. Pankanti, A. Senior and Y. Tian, “Smart Surveillance: Applications, Technologies and Implications”, ...
City eyes: An unified computational framework for intelligent video surveillance in cloud environment. In IEEE International Conference on Internet of Things (iThings), Green Computing and Communications (GreenCom), IEEE and Cyber, ...
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems.
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia.
Taking a hands-on approach that meets the needs of those working in the industry, this timely volume, illustrated with more than 300 color photos, supplies readers with a deeper understanding of how surveillance technology has developed and ...
This book is a continuation of our previous volumes on Innovations in Defence Support Systems. This book includes a sample of recent advances in intelligent monitoring.
As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, ...
Academic Paper from the year 2019 in the subject Computer Science - IT-Security, grade: 2.1, Bochum University of Applied Sciences (Information Technology), course: IT security, language: English, abstract: There are various advanced ...
The book takes the reader on a tour through the building blocks of intelligent network video--from imaging to network cameras and video encoders, through the IT technologies of network and storage and into video management, analytics, and ...