Скачать книгу

on id="ud3e000b4-c4a8-5bc7-98cc-8106357ebcd7">

      

      1  Cover

      2  Title Page

      3  Copyright

      4  Preface

      5  1 Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media 1.1 Introduction 1.2 Social Networks 1.3 What Is Cyber-Crime? 1.4 Rumor Detection 1.5 Factors to Detect Rumor Source 1.6 Source Detection in Network 1.7 Conclusion References

      6  2 Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction 2.1 Introduction 2.2 Advancement of Internet 2.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 2.4 A Definition of Security Frameworks 2.5 M2M Devices and Smartphone Technology 2.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 2.7 Security and Privacy Issues in IoT 2.8 Protection in Machine to Machine Communication 2.9 Use Cases for M2M Portability 2.10 Conclusion References

      7  3 Crime Predictive Model Using Big Data Analytics 3.1 Introduction 3.2 Crime Data Mining 3.3 Visual Data Analysis 3.4 Technological Analysis 3.5 Big Data Framework 3.6 Architecture for Crime Technical Model 3.7 Challenges 3.8 Conclusions References

      8  4 The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks 4.1 Introduction 4.2 Database and Methods 4.3 Discussion and Analysis 4.4 Role of Remote Sensing and GIS 4.5 Cartographic Model 4.6 Mapping Techniques Used for Defense Purposes 4.7 Naval Operations 4.8 Future Sphere of GIS in Military Science 4.9 Terrain Evolution 4.10 Conclusion References

      9  5 Text Mining for Secure Cyber Space 5.1 Introduction 5.2 Literature Review 5.3 Latent Semantic Analysis 5.4 Proposed Work 5.5 Detailed Work Flow of Proposed Approach 5.6 Results and Discussion 5.7 Conclusion References

      10  6 Analyses on Artificial Intelligence Framework to Detect Crime Pattern 6.1 Introduction 6.2 Related Works 6.3 Proposed Clustering for Detecting Crimes 6.4 Performance Evaluation 6.5 Conclusions References

      11  7 A Biometric Technology-Based Framework for Tackling and Preventing Crimes 7.1 Introduction 7.2 Biometrics 7.3 Surveillance Systems (CCTV) 7.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 7.5 Proposed Work (Biometric-Based CCTV System) 7.6 Conclusion References

      12 

Скачать книгу