Browse Results

Showing 15,076 through 15,100 of 85,166 results

Coloured Petri Nets: Modelling and Validation of Concurrent Systems

by Kurt Jensen Lars M. Kristensen

Coloured Petri Nets (CPN) is a graphical language for modelling and validating concurrent and distributed systems, and other systems in which concurrency plays a major role. The development of such systems is particularly challenging because of inherent intricacies like possible nondeterminism and the immense number of possible execution sequences. In this textbook Jensen and Kristensen introduce the constructs of the CPN modelling language and present the related analysis methods in detail. They also provide a comprehensive road map for the practical use of CPN by showcasing selected industrial case studies that illustrate the practical use of CPN modelling and validation for design, specification, simulation, verification and implementation in various application domains. Their presentation primarily aims at readers interested in the practical use of CPN. Thus all concepts and constructs are first informally introduced through examples and then followed by formal definitions (which may be skipped). The book is ideally suitable for a one-semester course at an advanced undergraduate or graduate level, and through its strong application examples can also serve for self-study. An accompanying website offers additional material such as slides, exercises and project proposals. Book website: http://www.cs.au.dk/CPnets/cpnbook/

COLT '89: Proceedings of the Second Annual Workshop, UC Santa Cruz, California, July 31 - August 2 1989

by Colt

Computational Learning Theory presents the theoretical issues in machine learning and computational models of learning. This book covers a wide range of problems in concept learning, inductive inference, and pattern recognition.Organized into three parts encompassing 32 chapters, this book begins with an overview of the inductive principle based on weak convergence of probability measures. This text then examines the framework for constructing learning algorithms. Other chapters consider the formal theory of learning, which is learning in the sense of improving computational efficiency as opposed to concept learning. This book discusses as well the informed parsimonious (IP) inference that generalizes the compatibility and weighted parsimony techniques, which are most commonly applied in biology. The final chapter deals with the construction of prediction algorithms in a situation in which a learner faces a sequence of trials, with a prediction to be given in each and the goal of the learner is to make some mistakes.This book is a valuable resource for students and teachers.

COLT Proceedings 1990

by Colt

COLT '90 covers the proceedings of the Third Annual Workshop on Computational Learning Theory, sponsored by the ACM SIGACT/SIGART, University of Rochester, Rochester, New York on August 6-8, 1990. The book focuses on the processes, methodologies, principles, and approaches involved in computational learning theory. The selection first elaborates on inductive inference of minimal programs, learning switch configurations, computational complexity of approximating distributions by probabilistic automata, and a learning criterion for stochastic rules. The text then takes a look at inductive identification of pattern languages with restricted substitutions, learning ring-sum-expansions, sample complexity of PAC-learning using random and chosen examples, and some problems of learning with an Oracle.The book examines a mechanical method of successful scientific inquiry, boosting a weak learning algorithm by majority, and learning by distances. Discussions focus on the relation to PAC learnability, majority-vote game, boosting a weak learner by majority vote, and a paradigm of scientific inquiry.The selection is a dependable source of data for researchers interested in the computational learning theory.

Column Layout Examples (large print)

by Rnib

This diagram shows examples of three of the many column layouts that might be used in a print publication. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. There are descriptive labels on the left of the page and layout examples on the right. In each example, the horizontal lines texture indicates areas of body text, and the fine dotted textured areas represent columns that might be used for headings, annotations, a table of contents, pull quotes, images, advertisements or even left empty to give the page an uncluttered look. Each example shows a single page.

Column Layout Examples (UEB contracted)

by Rnib

This diagram shows examples of three of the many column layouts that might be used in a print publication. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. There are descriptive labels on the left of the page and layout examples on the right. In each example, the horizontal lines texture indicates areas of body text, and the fine dotted textured areas represent columns that might be used for headings, annotations, a table of contents, pull quotes, images, advertisements or even left empty to give the page an uncluttered look. Each example shows a single page.

Column Layout Examples (UEB uncontracted)

by Rnib

This diagram shows examples of three of the many column layouts that might be used in a print publication. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. There are descriptive labels on the left of the page and layout examples on the right. In each example, the horizontal lines texture indicates areas of body text, and the fine dotted textured areas represent columns that might be used for headings, annotations, a table of contents, pull quotes, images, advertisements or even left empty to give the page an uncluttered look. Each example shows a single page.

The Columnist: Leaks, Lies, and Libel in Drew Pearson's Washington

by Donald A. Ritchie

Long before Wikileaks and social media, the journalist Drew Pearson exposed to public view information that public officials tried to keep hidden. A self-professed "keyhole peeper", Pearson devoted himself to revealing what politicians were doing behind closed doors. From 1932 to 1969, his daily "Washington Merry-Go-Round" column and weekly radio and TV commentary broke secrets, revealed classified information, and passed along rumors based on sources high and low in the federal government, while intelligence agents searched fruitlessly for his sources. For forty years, this syndicated columnist and radio and television commentator called public officials to account and forced them to confront the facts. Pearson's daily column, published in more than 600 newspapers, and his weekly radio and television commentaries led to the censure of two US senators, sent four members of the House to prison, and undermined numerous political careers. Every president from Franklin Roosevelt to Richard Nixon--and a quorum of Congress--called him a liar. Pearson was sued for libel more than any other journalist, in the end winning all but one of the cases. Breaking secrets was the heartbeat of Pearson's column. His ability to reveal classified information, even during wartime, motivated foreign and domestic intelligence agents to pursue him. He played cat and mouse with the investigators who shadowed him, tapped his phone, read his mail, and planted agents among his friends. Yet they rarely learned his sources. The FBI found it so fruitless to track down leaks to the columnist that it advised agencies to simply do a better job of keeping their files secret. Drawing on Pearson's extensive correspondence, diaries, and oral histories, The Columnist reveals the mystery behind Pearson's leaks and the accuracy of his most controversial revelations.

The Columnist: Leaks, Lies, and Libel in Drew Pearson's Washington

by Donald A. Ritchie

Long before Wikileaks and social media, the journalist Drew Pearson exposed to public view information that public officials tried to keep hidden. A self-professed "keyhole peeper", Pearson devoted himself to revealing what politicians were doing behind closed doors. From 1932 to 1969, his daily "Washington Merry-Go-Round" column and weekly radio and TV commentary broke secrets, revealed classified information, and passed along rumors based on sources high and low in the federal government, while intelligence agents searched fruitlessly for his sources. For forty years, this syndicated columnist and radio and television commentator called public officials to account and forced them to confront the facts. Pearson's daily column, published in more than 600 newspapers, and his weekly radio and television commentaries led to the censure of two US senators, sent four members of the House to prison, and undermined numerous political careers. Every president from Franklin Roosevelt to Richard Nixon--and a quorum of Congress--called him a liar. Pearson was sued for libel more than any other journalist, in the end winning all but one of the cases. Breaking secrets was the heartbeat of Pearson's column. His ability to reveal classified information, even during wartime, motivated foreign and domestic intelligence agents to pursue him. He played cat and mouse with the investigators who shadowed him, tapped his phone, read his mail, and planted agents among his friends. Yet they rarely learned his sources. The FBI found it so fruitless to track down leaks to the columnist that it advised agencies to simply do a better job of keeping their files secret. Drawing on Pearson's extensive correspondence, diaries, and oral histories, The Columnist reveals the mystery behind Pearson's leaks and the accuracy of his most controversial revelations.

COM and .NET Interoperability

by Andrew Troelsen

Author Andrew Troelsen tells about the building blocks of the COM and .NET architectures and how they interact (i.e. interoperate), with emphasis on a basic understanding of each component part and the role it plays.

Combat Modeling (International Series in Operations Research & Management Science #134)

by Alan Washburn Moshe Kress

"Combat Modeling" is a systematic learning resource and reference text for the quantitative analysis of combat. After a brief overview, authors Washburn and Kress present individual chapters on shooting without feedback; shooting with feedback; target defense; attrition models; game theory and wargames; search; unmanned aerial vehicles; and terror and insurgency. Three appendices provide a review of basic probability concepts, probability distributions, and Markov models; an introduction to optimization models; and a discussion of Monte-Carlo simulations. Drawing on their many years of experience at the Naval Postgraduate School in Monterey, California, Washburn and Kress have created a reference that will provide the tools and techniques for analysts involved in the underpinnings of combat decisions. This is a book that can be used as a military manual, reference book, and textbook for military courses on this vital subject.

Combating Fake News with Computational Intelligence Techniques (Studies in Computational Intelligence #1001)

by Mohamed Lahby Al-Sakib Khan Pathan Yassine Maleh Wael Mohamed Shaher Yafooz

This book presents the latest cutting-edge research, theoretical methods, and novel applications in the field of computational intelligence techniques and methods for combating fake news. Fake news is everywhere. Despite the efforts of major social network players such as Facebook and Twitter to fight disinformation, miracle cures and conspiracy theories continue to rain down on the net. Artificial intelligence can be a bulwark against the diversity of fake news on the Internet and social networks. This book discusses new models, practical solutions, and technological advances related to detecting and analyzing fake news based on computational intelligence models and techniques, to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence techniques. Further, the book helps readers understand computational intelligence techniques combating fake news in a systematic and straightforward way.

Combating Human Trafficking: A Multidisciplinary Approach

by Michael J. Palmiotto

A centuries-old crime, human trafficking occurs not only in undeveloped countries, but also in some surprising locations. Right here in the United States, individuals are recruited, transported, and held by unlawful means�either through deception or under threat of violence. Approaching the topic from a law enforcement perspective, Combating Human

Combating Online Hostile Posts in Regional Languages during Emergency Situation: First International Workshop, CONSTRAINT 2021, Collocated with AAAI 2021, Virtual Event, February 8, 2021, Revised Selected Papers (Communications in Computer and Information Science #1402)

by Tanmoy Chakraborty Kai Shu H. Russell Bernard Huan Liu Md Shad Akhtar

This book constitutes selected and revised papers from the First International Workshop on Combating On​line Ho​st​ile Posts in ​Regional Languages dur​ing Emerge​ncy Si​tuation, CONSTRAINT 2021, Collocated with AAAI 2021, held as virtual event, in February 2021. The 14 full papers and 9 short papers presented were thoroughly reviewed and selected from 62 qualified submissions. The papers present interdisciplinary approaches on multilingual social media analytics and non-conventional ways of combating online hostile posts.

Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques (Advanced Sciences and Technologies for Security Applications)

by Zubair Md. Fadlullah Al-Sakib Khan Pathan

This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars. The book explains how the security needs and implementations are inherently different at different stages of the big data centric system, namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state-of-the-art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era.

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat

by Paul Piccard

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware’s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.* A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combative Politics: The Media and Public Perceptions of Lawmaking

by Mary Layton Atkinson

From the Affordable Care Act to No Child Left Behind, politicians often face a puzzling problem: although most Americans support the aims and key provisions of these policies, they oppose the bills themselves. How can this be? Why does the American public so often reject policies that seem to offer them exactly what they want? By the time a bill is pushed through Congress or ultimately defeated, we’ve often been exposed to weeks, months—even years—of media coverage that underscores the unpopular process of policymaking, and Mary Layton Atkinson argues that this leads us to reject the bill itself. Contrary to many Americans’ understandings of the policymaking process, the best answer to a complex problem is rarely self-evident, and politicians must weigh many potential options, each with merits and drawbacks. As the public awaits a resolution, the news media tend to focus not on the substance of the debate but on descriptions of partisan combat. This coverage leads the public to believe everyone in Washington has lost sight of the problem altogether and is merely pursuing policies designed for individual political gain. Politicians in turn exacerbate the problem when they focus their objections to proposed policies on the lawmaking process, claiming, for example, that a bill is being pushed through Congress with maneuvers designed to limit minority party input. These negative portrayals become linked in many people’s minds with the policy itself, leading to backlash against bills that may otherwise be seen as widely beneficial. Atkinson argues that journalists and educators can make changes to help inoculate Americans against the idea that debate always signifies dysfunction in the government. Journalists should strive to better connect information about policy provisions to the problems they are designed to ameliorate. Educators should stress that although debate sometimes serves political interests, it also offers citizens a window onto the lawmaking process that can help them evaluate the work their government is doing.

Combatting Cyberbullying in Digital Media with Artificial Intelligence

by Mohamed Lahby

Rapid advancements in mobile computing and communication technology and recent technological progress have opened up a plethora of opportunities. These advancements have expanded knowledge, facilitated global business, enhanced collaboration, and connected people through various digital media platforms. While these virtual platforms have provided new avenues for communication and self-expression, they also pose significant threats to our privacy. As a result, we must remain vigilant against the propagation of electronic violence through social networks. Cyberbullying has emerged as a particularly concerning form of online harassment and bullying, with instances of racism, terrorism, and various types of trolling becoming increasingly prevalent worldwide. Addressing the issue of cyberbullying to find effective solutions is a challenge for the web mining community, particularly within the realm of social media. In this context, artificial intelligence (AI) can serve as a valuable tool in combating the diverse manifestations of cyberbullying on the Internet and social networks. This book presents the latest cutting-edge research, theoretical methods, and novel applications in AI techniques to combat cyberbullying. Discussing new models, practical solutions, and technological advances related to detecting and analyzing cyberbullying is based on AI models and other related techniques. Furthermore, the book helps readers understand AI techniques to combat cyberbullying systematically and forthrightly, as well as future insights and the societal and technical aspects of natural language processing (NLP)-based cyberbullying research efforts. Key Features: Proposes new models, practical solutions and technological advances related to machine intelligence techniques for detecting cyberbullying across multiple social media platforms. Combines both theory and practice so that readers (beginners or experts) of this book can find both a description of the concepts and context related to the machine intelligence. Includes many case studies and applications of machine intelligence for combating cyberbullying.

Combatting Cyberbullying in Digital Media with Artificial Intelligence


Rapid advancements in mobile computing and communication technology and recent technological progress have opened up a plethora of opportunities. These advancements have expanded knowledge, facilitated global business, enhanced collaboration, and connected people through various digital media platforms. While these virtual platforms have provided new avenues for communication and self-expression, they also pose significant threats to our privacy. As a result, we must remain vigilant against the propagation of electronic violence through social networks. Cyberbullying has emerged as a particularly concerning form of online harassment and bullying, with instances of racism, terrorism, and various types of trolling becoming increasingly prevalent worldwide. Addressing the issue of cyberbullying to find effective solutions is a challenge for the web mining community, particularly within the realm of social media. In this context, artificial intelligence (AI) can serve as a valuable tool in combating the diverse manifestations of cyberbullying on the Internet and social networks. This book presents the latest cutting-edge research, theoretical methods, and novel applications in AI techniques to combat cyberbullying. Discussing new models, practical solutions, and technological advances related to detecting and analyzing cyberbullying is based on AI models and other related techniques. Furthermore, the book helps readers understand AI techniques to combat cyberbullying systematically and forthrightly, as well as future insights and the societal and technical aspects of natural language processing (NLP)-based cyberbullying research efforts. Key Features: Proposes new models, practical solutions and technological advances related to machine intelligence techniques for detecting cyberbullying across multiple social media platforms. Combines both theory and practice so that readers (beginners or experts) of this book can find both a description of the concepts and context related to the machine intelligence. Includes many case studies and applications of machine intelligence for combating cyberbullying.

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities (Advanced Sciences and Technologies for Security Applications)

by Babak Akhgar Ben Brewster

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues. Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

Refine Search

Showing 15,076 through 15,100 of 85,166 results