Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities [E-Book] / edited by Nadia Nedjah, Ahmed A. Abd El-Latif, Brij B. Gupta, Luiza M. Mourelle
This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologi...
Saved in:
Full text |
|
Personal Name(s): | Abd El-Latif, Ahmed A., editor |
Gupta, Brij B., editor / Mourelle, Luiza M., editor / Nedjah, Nadia, editor | |
Edition: |
1st edition 2022 |
Imprint: |
Cham :
Springer,
2022
|
Physical Description: |
VIII, 262 pages 138 illustrations, 96 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030967376 |
DOI: |
10.1007/978-3-030-96737-6 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Studies in Computational Intelligence ;
1030 |
Subject (LOC): |
- Deep Learning in Robotics for strengthening Industry 4.0.: Opportunities, Challenges and Future Directions
- The Design of a Pheromone-based Robotic Varroa Trap for Beekeeping Applications
- Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey
- Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities
- Privacy & Security Concerns in Edge Computing-based Smart Cities
- A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN)
- Developing instrument for investigation of blockchain technology
- An IoT-based system for expert user supporting to monitor, manage and protect Cultural Heritage Buildings
- Commercialising Blockchain in a Smart City: Autonomous Vehicles, Cryptocurrency, and Contract Law
- Finding all shortest meaningful meta-paths between two vertices of a Secured Large Heterogeneous Information Network using distributed algorithm
- Creation of a Dataset Modeling the Behavior of Malware Affectingthe Confidentiality of Data Managed by IoT Devices
- Anomaly Detection on Static and Dynamic Graphs using Graph Convolutional Neural Network
- Secure Medical Data sharing through Blockchain and Decentralized Models. .