001454766 000__ 04807cam\a2200541\i\4500 001454766 001__ 1454766 001454766 003__ OCoLC 001454766 005__ 20230314003227.0 001454766 006__ m\\\\\o\\d\\\\\\\\ 001454766 007__ cr\cn\nnnunnun 001454766 008__ 230223s2023\\\\sz\a\\\\o\\\\\000\0\eng\d 001454766 020__ $$a9783031211997$$q(electronic bk.) 001454766 020__ $$a3031211995$$q(electronic bk.) 001454766 020__ $$z3031211987 001454766 020__ $$z9783031211980 001454766 0247_ $$a10.1007/978-3-031-21199-7$$2doi 001454766 035__ $$aSP(OCoLC)1371056548 001454766 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP 001454766 049__ $$aISEA 001454766 050_4 $$aHV6773.15.C92 001454766 08204 $$a302.34302854678$$223/eng/20230223 001454766 24500 $$aKids cybersecurity using computational intelligence techniques /$$cWael M. S. Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara, editors. 001454766 264_1 $$aCham, Switzerland :$$bSpringer,$$c2023. 001454766 300__ $$a1 online resource (274 pages) :$$billustrations (black and white, and colour). 001454766 336__ $$atext$$btxt$$2rdacontent 001454766 337__ $$acomputer$$bc$$2rdamedia 001454766 338__ $$aonline resource$$bcr$$2rdacarrier 001454766 4901_ $$aStudies in computational intelligence ;$$vvolume 1080 001454766 5050_ $$aPart 1: State-of-the-art -- Everyday Cyber Safety for Students -- Machine Learning Approaches for Kids E-learning Monitoring -- Factors influencing on online education outcomes an empirical study based on Kids parents -- Review on the Social Media Management Techniques against kids Harmful Information -- Review of Information Security Management Frameworks -- Database Forensics Field and Children Crimes -- From exhibitionism to addiction, or cyber threats among children and adolescents -- Part II: Cyberbullying and Kids cyber security -- Protection of Users Kids on Twitter Platform using Naive Bayes -- The Impact of Fake News Spread on Social Media on The Children in Indonesia During Covid-19 -- A Preventive Approach to Weapons Detection for Children Using Quantum Deep Learning -- Learning Arabic for Kids online Using Google Classroom -- Child Emotion Recognition Via Custom Lightweight CNN Architecture -- Cybercrime Sentimental Analysis for Child YouTube Video Dataset Using Hybrid Support Vector Machine With Ant Colony Optimization Algorithm -- Cyberbullying Awareness Through Sentiment Analysis Based On Twitter -- The Impact of Fake News on Kids Life from the Holy Al-Qur'an Perspective -- Early Prediction of Dyslexia Risk Factors in Kids through Machine Learning Techniques -- Development of Metamodel for Information Security Risk Management -- Detecting Kids Cyberbullying Using Transfer Learning Approach from Transformer Fine-Tuning Models -- YouTube Sentiment Analysis: Performance Model Evaluation. 001454766 506__ $$aAccess limited to authorized users. 001454766 520__ $$aThis book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kids textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kids exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity. 001454766 588__ $$aDescription based on print version record. 001454766 650_0 $$aCyberbullying$$xPrevention. 001454766 650_0 $$aComputational intelligence. 001454766 650_0 $$aInternet and children$$xSafety measures. 001454766 655_0 $$aElectronic books. 001454766 7001_ $$aYafooz, Wael,$$eeditor. 001454766 7001_ $$aAl-Aqrabi, Hussain,$$eeditor. 001454766 7001_ $$aAl-Dhaqm, Arafat,$$eeditor. 001454766 7001_ $$aHamid, Abdel,$$eeditor. 001454766 77608 $$iPrint version:$$tKIDS CYBERSECURITY USING COMPUTATIONAL INTELLIGENCE TECHNIQUES.$$d[Place of publication not identified] : SPRINGER INTERNATIONAL PU, 2023$$z3031211987$$w(OCoLC)1347429166 001454766 830_0 $$aStudies in computational intelligence ;$$vv. 1080. 001454766 852__ $$bebk 001454766 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-21199-7$$zOnline Access$$91397441.1 001454766 909CO $$ooai:library.usi.edu:1454766$$pGLOBAL_SET 001454766 980__ $$aBIB 001454766 980__ $$aEBOOK 001454766 982__ $$aEbook 001454766 983__ $$aOnline 001454766 994__ $$a92$$bISE