Global Perspectives on the Applications of Computer Vision in Cybersecurity

Global Perspectives on the Applications of Computer Vision in Cybersecurity

Franklin Tchakounté, Marcellin Atemkeng
Release Date: May, 2024|Copyright: © 2024 |Pages: 306
DOI: 10.4018/978-1-6684-8127-1
ISBN13: 9781668481271|ISBN10: 1668481278|ISBN13 Softcover: 9781668481288|EISBN13: 9781668481295
Hardcover:
Forthcoming
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Forthcoming
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Forthcoming
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Forthcoming
$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Softcover:
Forthcoming
$190.00
TOTAL SAVINGS: $190.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Softcover:
Forthcoming
$190.00
TOTAL SAVINGS: $190.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Article Processing Charge:
$1,950.00
TOTAL SAVINGS: $1,950.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

As cybersecurity threats continue to grow in scale and complexity, it is crucial to explore new and innovative solutions to combat them. The application of computer vision (CV) techniques in cybersecurity offers a promising solution to protect sensitive data and systems from malicious attacks. By leveraging CV algorithms, cybersecurity professionals and researchers can design more efficient and effective cybersecurity solutions, making them better equipped to handle the growing number of cyber threats.

Global Perspectives on the Applications of Computer Vision in Cybersecurity is a comprehensive guide that offers practical insights into the principles and techniques of computer vision for cybersecurity. The book highlights the real-world applications of CV in various domains, including computer system security, web security, network security, IoT security, and digital forensics. It also emphasizes the importance of responsible CV for cybersecurity, ensuring that CV models adhere to ethical principles and are transparent and interpretable. By reading this book, cybersecurity professionals and researchers can gain a better understanding of how to use CV techniques to design solid cybersecurity solutions and address the challenges involved. With the guidance of the editors, Franklin Tchakounte and Marcellin Atemkeng, who are experts in both cybersecurity and computer vision, readers can leverage the power of CV to secure the future of our digital world. Join the movement today to revolutionize the field of cybersecurity and protect against the growing threat of cyber-attacks.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Big Data Analytics for Cybersecurity
  • Computer Vision Principles and Techniques
  • Cybersecurity Ethics
  • Digital Forensics
  • Explainable/Interpretable Computer Vision
  • Fake News Detection
  • Healthcare Data Protection
  • Image Reconstruction
  • Image/Object Detection and Tracking
  • Mobile/Computer/Web/Network/IoT Security
  • Responsible Computer Vision
  • Safe Vision
  • Semantic/Instance Segmentation
  • Social Media Security
  • User Privacy
  • Visual/Text Interpretability and Explicability
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Franklin Tchakounte is an Associate Professor and researcher in computer science with more than 10 years of experience in cybersecurity and data intelligence. He received his M.Sc. in Computer engineering from the University of Ngaoundere (Cameroon, 2010) and his Ph.D. in Mobile Security from the University of Bremen (Germany, 2015). Franklin owns several IT certifications. He authored books, book chapters, and several research papers in cyber security. He is the founder of the Cybersecurity with Computational and Artificial Intelligence (CyComAI, ) company. He has been involved in international projects. He is a fellow of DAAD Staff Exchange in Sub-Saharan Africa, Research Mobility grants in Cameroon, and the WebWeWant F.A.S.T project. He is a member of numerous societies: EAI, ISOC SIG Cybersecurity, ISOC SIG Cybersecurity Training and Education, Research Data Alliance (RDA), AuthorAID, and Africa Association of Entrepreneurs (AAE). He is currently the Cameroonian representative of Responsibility in AI in Africa (RAIN) and his interests include cyber security and artificial/digital intelligence.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.