Malware detection on smart wearables using machine learning algorithms (Record no. 10477)

MARC details
000 -LEADER
fixed length control field 01915nam a2200241 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251029175009.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251029b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031659324
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number ALA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Alaba, Fadele Ayotunde
245 ## - TITLE STATEMENT
Title Malware detection on smart wearables using machine learning algorithms
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer
Date of publication, distribution, etc. 2025
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 130 p.
365 ## - TRADE PRICE
Price type code EURO
Price amount 129.99
490 ## - SERIES STATEMENT
Series statement Studies in Systems, Decision and Control (SSDC, volume 549)
500 ## - GENERAL NOTE
General note Table of contents:<br/>Front Matter<br/>Pages i-xvii<br/>Download chapter PDF <br/>Introduction<br/>Fadele Ayotunde Alaba, Alvaro Rocha<br/>Pages 1-31<br/>Security Challenges of Wearable Technology<br/>Fadele Ayotunde Alaba, Alvaro Rocha<br/>Pages 33-66<br/>Machine Learning Algorithms on Malware Detection Against Smart Wearable Devices<br/>Fadele Ayotunde Alaba, Alvaro Rocha<br/>Pages 67-94<br/>Implementation Results<br/>Fadele Ayotunde Alaba, Alvaro Rocha<br/>Pages 95-119<br/>Conclusions, Future Directions, and Recommendations<br/>Fadele Ayotunde Alaba, Alvaro Rocha<br/>Pages 121-126<br/><br/>[https://link.springer.com/book/10.1007/978-3-031-65933-1]
520 ## - SUMMARY, ETC.
Summary, etc. This book digs into the important confluence of cybersecurity and big data, providing insights into the ever-changing environment of cyber threats and solutions to protect these enormous databases. In the modern digital era, large amounts of data have evolved into the vital organs of businesses, providing the impetus for decision-making, creativity, and a competitive edge. Cyberattacks pose a persistent danger to this important resource since they can result in data breaches, financial losses, and harm to an organization's brand.<br/><br/>(https://link.springer.com/book/10.1007/978-3-031-65933-1)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware detection
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberlaw
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security--Wearable Technology
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Rocha, Alvaro
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Bill No Bill Date Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Accession Number Date last seen Copy number Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     IT & Decisions Sciences 390/25-26 09-10-2025 Indian Institute of Management LRC Indian Institute of Management LRC General Stacks 11/02/2025 T V Enterprises 8844.78   005.8 ALA 009225 11/02/2025 1 13607.35 11/02/2025 Book

©2025-26 Pragyata: Learning Resource Center. All Rights Reserved.
Indian Institute of Management Bodh Gaya
Uruvela, Prabandh Vihar, Bodh Gaya
Gaya, 824234, Bihar, India

Powered by Koha