My library button
  • Book cover of Digital Forensics in the Era of Artificial Intelligence
    Nour Moustafa

     · 2022

    Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

  • Book cover of Responsible Graph Neural Networks

    More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications. Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic, generative, and reinforcement learning and how they can be used for developing cyber defense models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms, and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

  • Book cover of Deep Learning Approaches for Security Threats in IoT Environments

    Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment In Deep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation. This book applies deep learning approaches to IoT networks and solves the security problems that professionals frequently encounter when working in the field of IoT, as well as providing ways in which smart devices can solve cybersecurity issues. Readers will also get access to a companion website with PowerPoint presentations, links to supporting videos, and additional resources. They’ll also find: A thorough introduction to artificial intelligence and the Internet of Things, including key concepts like deep learning, security, and privacy Comprehensive discussions of the architectures, protocols, and standards that form the foundation of deep learning for securing modern IoT systems and networks In-depth examinations of the architectural design of cloud, fog, and edge computing networks Fulsome presentations of the security requirements, threats, and countermeasures relevant to IoT networks Perfect for professionals working in the AI, cybersecurity, and IoT industries, Deep Learning Approaches for Security Threats in IoT Environments will also earn a place in the libraries of undergraduate and graduate students studying deep learning, cybersecurity, privacy preservation, and the security of IoT networks.

  • Book cover of Deep Learning Techniques for IoT Security and Privacy

    This book states that the major aim audience are people who have some familiarity with Internet of things (IoT) but interested to get a comprehensive interpretation of the role of deep Learning in maintaining the security and privacy of IoT. A reader should be friendly with Python and the basics of machine learning and deep learning. Interpretation of statistics and probability theory will be a plus but is not certainly vital for identifying most of the book's material.

  • Book cover of Explainable Artificial Intelligence for Trustworthy Internet of Things

    From innovative solutions for securing IoT infrastructures against security attacks and privacy threats to advanced topics including responsible security intelligence, this comprehensive co-authored book offers a complete study of explainable artificial intelligence (XAI) for securing the internet of things (IoT).

  • No image available

    Using 'Active learning' approach, this book presents a unique method to learning database development. Students follow the case of a business database system of a grocery store from the start as a case study all the way to the complete operational system. The introduction of barcode and NFC readers being optional nonetheless greatly enhance the experience and interest in the subject. This book would make excellent complement for many database design books that focus on the theory and less on the application. "In my 16 years of teaching in higher education, I have noticed students understand database theory better once they use database in application. Case study practice helps students understand abstract concepts such as entities, tables, attributes, primary keys, foreign keys, relationships and other database concepts and terms better." - Dr. Fadi Safieddine

  • No image available

    This book presents a unique method to learning database development using active learning approach. Students follow the case of a business database system of a grocery store from the start all the way to the complete operational system. The introduction of barcode and NFC readers being optional nonetheless greatly enhance the experience and interest in the subject. This book would make excellent companion to many database books that focus on the theory and less on the application. "In my 16 years of teaching in higher education, I have noticed students understand database theory better once they use database in application. Case study practice helps students understand abstract concepts such as entities, tables, attributes, primary keys, foreign keys, relationships and other database concepts and terms better." - Dr. Fadi Safieddine