MARC details
000 -LIDER |
fixed length control field |
05075nam a22005775i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-031-21199-7 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240207153506.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230220s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031211997 |
-- |
978-3-031-21199-7 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
Q342 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
TEC009000 |
Source |
bisacsh |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UYQ |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.3 |
Edition number |
23 |
245 10 - TITLE STATEMENT |
Title |
Kids Cybersecurity Using Computational Intelligence Techniques |
Medium |
[electronic resource] / |
Statement of responsibility, etc. |
edited by Wael M. S. Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2023. |
264 #1 - |
-- |
Cham : |
-- |
Springer International Publishing : |
-- |
Imprint: Springer, |
-- |
2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VI, 282 p. 93 illus., 74 illus. in color. |
Other physical details |
online resource. |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
347 ## - |
-- |
text file |
-- |
PDF |
-- |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Studies in Computational Intelligence, |
International Standard Serial Number |
1860-9503 ; |
Volume/sequential designation |
1080 |
500 ## - GENERAL NOTE |
General note |
Acceso multiusuario |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1: State-of-the-art -- Everyday Cyber Safety for Students -- Machine Learning Approaches for Kids' E-learning Monitoring -- Factors influencing on online education outcomes- an empirical study based on Kids' parents -- Review on the Social Media Management Techniques against kids Harmful Information -- Review of Information Security Management Frameworks -- Database Forensics Field and Children Crimes -- From exhibitionism to addiction, or cyber threats among children and adolescents -- Part II: Cyberbullying and Kids cyber security -- Protection of Users Kids on Twitter Platform using Naïve Bayes -- The Impact of Fake News Spread on Social Media on The Children in Indonesia During Covid-19 -- A Preventive Approach to Weapons Detection for Children Using Quantum Deep Learning -- Learning Arabic for Kids online Using Google Classroom -- Child Emotion Recognition Via Custom Lightweight CNN Architecture -- Cybercrime Sentimental Analysis for Child YouTube Video Dataset Using Hybrid Support Vector Machine With Ant Colony Optimization Algorithm -- Cyberbullying Awareness Through Sentiment Analysis Based On Twitter -- The Impact of Fake News on Kid's Life from the Holy Al-Qur'an Perspective -- Early Prediction of Dyslexia Risk Factors in Kids through Machine Learning Techniques -- Development of Metamodel for Information Security Risk Management -- Detecting Kids Cyberbullying Using Transfer Learning Approach from Transformer Fine-Tuning Models -- YouTube Sentiment Analysis: Performance Model Evaluation. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid's textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid's exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Owner |
UABC ; |
Method of acquisition |
Perpetuidad |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computational intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial intelligence. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Computational Intelligence. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Término temático o nombre geográfico como elemento de entrada |
Artificial Intelligence. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Yafooz, Wael M. S. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Al-Aqrabi, Hussain. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Al-Dhaqm, Arafat. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Emara, Abdelhamid. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031211980 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031212000 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9783031212017 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Studies in Computational Intelligence, |
-- |
1860-9503 ; |
Volume number/sequential designation |
1080 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Public note |
Libro electrónico |
Uniform Resource Identifier |
http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-21199-7 |
912 ## - |
-- |
ZDB-2-INR |
912 ## - |
-- |
ZDB-2-SXIT |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Libro Electrónico |