Cyber Intelligence and Information Retrieval


Book Description

This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.







Cyber Intelligence and Information Retrieval


Book Description

This book features selected research papers presented at the 2nd International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023) held at the Institute of Engineering & Management, Kolkata, India, in association with CSI Kolkata section on 14-15 December 2023. Cyber intelligence and information retrieval are closely related fields that deal with the collection, analysis, and utilization of data and information from various digital sources. These fields are crucial in today's digital age, where vast amounts of data are generated and stored electronically. By combining the strengths of cyber intelligence and information retrieval, organizations can enhance their ability to detect, respond to, and mitigate cyber threats, while also improving their overall cybersecurity posture and decision-making processes. This book comprises high-quality research work by academicians and industrial experts in the field of artificial intelligence, data analytics, computing, and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data analytics, machine learning, Internet of Things (IoT), information security, etc.




Cyber Intelligence and Information Retrieval


Book Description

This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023), held at Institute of Engineering & Management, Kolkata, India during 14 – 15 December 2023. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher order neural computing, rough set and fuzzy set theory, and nature inspired computing techniques.




Computational Intelligence for Information Retrieval


Book Description

This book provides a thorough understanding of the integration of computational intelligence with information retrieval including content-based image retrieval using intelligent techniques, hybrid computational intelligence for pattern recognition, intelligent innovative systems, and protecting and analysing big data on cloud platforms. The book aims to investigate how computational intelligence frameworks are going to improve information retrieval systems. The emerging and promising state-of-the-art of human–computer interaction is the motivation behind this book. The book covers a wide range of topics, starting from the tools and languages of artificial intelligence to its philosophical implications, and thus provides a plethora of theoretical as well as experimental research, along with surveys and impact studies. Further, the book aims to showcase the basics of information retrieval and computational intelligence for beginners, as well as their integration, and challenge discussions for existing practitioners, including using hybrid application of augmented reality, computational intelligence techniques for recommendation systems in big data, and a fuzzy-based approach for characterization and identification of sentiments.




Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)


Book Description

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.




International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019


Book Description

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.




2021 International Conference on Applications and Techniques in Cyber Intelligence


Book Description

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users. 1. Highlights recent applications and techniques in cyber intelligence 2. Includes the proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021) 3. Presents a broad range of scientific research on cyber intelligence




Machine Intelligence and Data Science Applications


Book Description

This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 – 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.




Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application


Book Description

In the evolving landscape of Web3, the use of advanced machine learning, artificial intelligence, and cybersecurity transforms industries through theoretical exploration and practical application. The integration of advanced machine learning and AI techniques promises enhanced security protocols, predictive analytics, and adaptive defenses against the increasing number of cyber threats. However, these technological improvements also raise questions regarding privacy, transparency, and the ethical implications of AI-driven security measures. Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application explores theories and applications of improved technological techniques in Web 3.0. It addresses the challenges inherent to decentralization while harnessing the benefits offered by advances, thereby paving the way for a safer and more advanced digital era. Covering topics such as fraud detection, cryptocurrency, and data management, this book is a useful resource for computer engineers, financial institutions, security and IT professionals, business owners, researchers, scientists, and academicians.