Intro; Contents; ITNG 2018 Organization; General Chair and Editor; Vice General Chair; Track Chairs and Associate Editors; Track Co-Chairs and Session Chairs; Program Committee Members; Conference Secretary; Industry Partnership; Chair Message; List of Reviewers; Part I Cybersecurity; 1 Safeguarding Personal Health Information: Case Study; 1.1 Introduction; 1.2 Proposed Work; 1.3 Findings and Results; 1.4 Conclusions; References; 2 Cybersecurity as People Powered Perpetual Innovation; 2.1 Introduction; 2.2 Leadership; 2.3 People as Expenses; 2.4 Ethical Leadership and Innovation
2.5 Cybersecurity; 2.6 Cybersecurity Is Interdisciplinary; 2.7 The Role of Governance; 2.8 People Are Our Greatest Strength in Cybersecurity; 2.9 Recommendation; References; 3 Performance Study of the Impact of Security on 802.11ac Networks; 3.1 Introduction; 3.2 Related Research; 3.3 Experimental Setup; 3.4 Discussion of Results; 3.4.1 Throuhgput; 3.4.2 Delay; 3.4.3 Jitter; 3.4.4 Connection Time; 3.4.5 Loss Ratio; 3.5 Conclusion and Future Work; References; 4 Training Neural Tensor Networks with the Never Ending Language Learner; 4.1 Introduction; 4.2 Related Works; 4.3 Method; 4.3.1 NELL
4.3.2 Neural Tensor Network; 4.4 Experiments; 4.4.1 Dataset and Training Details; 4.4.2 Results; 4.5 Conclusion; References; 5 PERIA-Framework: A Prediction Extension Revision Image Annotation Framework; 5.1 Introduction; 5.2 Background and Motivation; 5.2.1 Automatic Image Annotation; 5.2.2 Manual Image Annotation; 5.2.3 Issues and Motivations; 5.3 PERIA-Framework; 5.3.1 Prediction Mechanism; 5.3.2 Extension Mechanism; 5.3.3 Revision Mechanism; 5.4 PERIA-Framework Instantiation; 5.5 Evaluation and Discussion; 5.6 Conclusion and Future Works; References
6 The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan; 6.1 Introduction; 6.2 Measures to Provide Information Security in Kazakhstan; 6.3 Overview of Information Security Incidents in Kazakhstan; 6.4 Conclusion; References; 7 Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network; 7.1 UK NHS Information System Infrastructure; 7.2 Threats; 7.3 Vulnerabilities to Identity Management; 7.4 Identity Management Protection; 7.5 Conclusions; References
8 A Virtual Animated Commentator Architecture for Cybersecurity Competitions; 8.1 Introduction; 8.2 The Commentator Subsystem; 8.2.1 Virtual Commentary Architecture; 8.2.2 Motion Generation; 8.2.3 Speech Generation; 8.3 Preliminary Results; 8.3.1 Generating Expressions and Gestures; 8.3.2 Generate a Marked-up Animation Sequence; 8.4 Related Work; 8.5 Conclusion; References; 9 Malicious Software Classification Using VGG16 Deep Neural Network's Bottleneck Features; 9.1 Introduction; 9.2 Related Work; 9.3 Methodology; 9.3.1 Byteplot Visualization; 9.3.2 VGG16 Architecture; 9.3.3 Transfer Learning
0
8
8
8
8
"This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology - New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education."--
Springer Nature
com.springer.onix.9783319770284
Computer science, Congresses.
Electrical engineering.
Information technology, Congresses.
Algorithms & data structures.
Computer science.
Computer security.
COMPUTERS-- Computer Literacy.
COMPUTERS-- Computer Science.
COMPUTERS-- Data Processing.
COMPUTERS-- Hardware-- General.
COMPUTERS-- Information Technology.
COMPUTERS-- Machine Theory.
COMPUTERS-- Reference.
Electrical engineering.
Information retrieval.
Information technology.
COM-- 013000
COM-- 014000
COM-- 018000
COM-- 032000
COM-- 037000
COM-- 052000
COM-- 067000
004
23
QA75
.
5
Latifi, Shahram
International Conference on Information Technology: New Generations(15th :2018 :, Las Vegas, Nev.)