Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Confluence of AI, machine, and deep ...
~
Arumugam, Chamundeswari, (1971-)
Confluence of AI, machine, and deep learning in cyber forensics
Record Type:
Electronic resources : Monograph/item
Title/Author:
Confluence of AI, machine, and deep learning in cyber forensicsSanjay Misra, Chamundeswari Arumugam, Suresh Jaganathan, and Shunmuganathan Saraswathi.
remainder title:
Confluence of artificial intelligence, machine, and deep learning in cyber forensics
other author:
Misra, Sanjay.
Published:
Hershey, Pennsylvania :IGI Global,2021.
Description:
1 online resource (xix, 248 p.)
Subject:
Computer crimesInvestigation.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4900-1
ISBN:
9781799849018 (ebk.)
Confluence of AI, machine, and deep learning in cyber forensics
Confluence of AI, machine, and deep learning in cyber forensics
[electronic resource] /Confluence of artificial intelligence, machine, and deep learning in cyber forensics Sanjay Misra, Chamundeswari Arumugam, Suresh Jaganathan, and Shunmuganathan Saraswathi. - Hershey, Pennsylvania :IGI Global,2021. - 1 online resource (xix, 248 p.)
Includes bibliographical references and index.
Chapter 1. A comprehensive perspective on mobile forensics: process, tools, and future trends -- Chapter 2. Applications of machine learning in cyber forensics -- Chapter 3. Machine learning forensics: a new branch of digital forensics -- Chapter 4. Crucial role of data analytics in the prevention and detection of cyber security attacks -- Chapter 5. Deep learning approaches to overcome challenges in forensics -- Chapter 6. Deep learning-based malware detection and classification -- Chapter 7. Detecting fake news using deep learning and NLP -- Chapter 8. Impediments in mobile forensics -- Chapter 9. Use-case of blockchain in cybercrime and cyberattack -- Chapter 10. Motivational quotes-based intelligent insider threat prediction model -- Chapter 11. Challenges of developing AI applications in the evolving digital world and recommendations to mitigate such challenges: a conceptual view -- Chapter 12. Challenges in developing software in today's scenario: an analysis at developmental stage level.
"The book provides original research about cyber forensics and its relationship to Artificial Intelligence (AI) and presents the results of research and case studies that advance the practice and understanding of cyber forensics methods and techniques to support efficient and effective investigations. It covers a variety of topics, including forensic analysis, cloud forensics, forensics storage, mobile device forensics, forensic reporting, forensics tools, and more"--
ISBN: 9781799849018 (ebk.)Subjects--Topical Terms:
203448
Computer crimes
--Investigation.
LC Class. No.: HV8079.C65 / C66 2021
Dewey Class. No.: 363.250285/63
Confluence of AI, machine, and deep learning in cyber forensics
LDR
:02567nmm a2200277 a 4500
001
603632
003
IGIG
005
20211027094137.0
006
m o d
007
cr cn
008
211118s2021 pau fob 001 0 eng d
020
$a
9781799849018 (ebk.)
020
$a
9781799849001 (hbk.)
020
$a
9781799858386 (pbk.)
035
$a
(OCoLC)1224335969
035
$a
1101012297
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
HV8079.C65
$b
C66 2021
082
0 0
$a
363.250285/63
$2
23
245
0 0
$a
Confluence of AI, machine, and deep learning in cyber forensics
$h
[electronic resource] /
$c
Sanjay Misra, Chamundeswari Arumugam, Suresh Jaganathan, and Shunmuganathan Saraswathi.
246
3
$a
Confluence of artificial intelligence, machine, and deep learning in cyber forensics
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2021.
300
$a
1 online resource (xix, 248 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. A comprehensive perspective on mobile forensics: process, tools, and future trends -- Chapter 2. Applications of machine learning in cyber forensics -- Chapter 3. Machine learning forensics: a new branch of digital forensics -- Chapter 4. Crucial role of data analytics in the prevention and detection of cyber security attacks -- Chapter 5. Deep learning approaches to overcome challenges in forensics -- Chapter 6. Deep learning-based malware detection and classification -- Chapter 7. Detecting fake news using deep learning and NLP -- Chapter 8. Impediments in mobile forensics -- Chapter 9. Use-case of blockchain in cybercrime and cyberattack -- Chapter 10. Motivational quotes-based intelligent insider threat prediction model -- Chapter 11. Challenges of developing AI applications in the evolving digital world and recommendations to mitigate such challenges: a conceptual view -- Chapter 12. Challenges in developing software in today's scenario: an analysis at developmental stage level.
520
3
$a
"The book provides original research about cyber forensics and its relationship to Artificial Intelligence (AI) and presents the results of research and case studies that advance the practice and understanding of cyber forensics methods and techniques to support efficient and effective investigations. It covers a variety of topics, including forensic analysis, cloud forensics, forensics storage, mobile device forensics, forensic reporting, forensics tools, and more"--
$c
Provided by publisher.
650
0
$a
Computer crimes
$x
Investigation.
$3
203448
650
0
$a
Artificial intelligence.
$3
194058
700
1
$a
Misra, Sanjay.
$3
824607
700
1
$a
Arumugam, Chamundeswari,
$d
1971-
$3
900230
700
1
$a
Jaganathan, Suresh,
$d
1972-
$3
900231
700
1
$a
Saraswathi, Shunmuganathan,
$d
1977-
$3
900232
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4900-1
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000202363
電子館藏
1圖書
電子書
EB HV8079.C65 C66 2021 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4900-1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login