This book addresses two aspects— Impact of research: How is the research on ICTs in the Global South playing a role in ...
اقرأ المزيدThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
اقرأ المزيدExplores the economics and technology of AI, IOT, and 5G integration Delivers a comprehensive technological and economic ...
اقرأ المزيدA further important component of machine intelligence is a kind of “structural uniformity” giving room and possibility ...
اقرأ المزيدExplores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
اقرأ المزيدPresents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, ...
اقرأ المزيدThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
اقرأ المزيدThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
اقرأ المزيدDescribes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
اقرأ المزيدThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
اقرأ المزيدThis book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It ...
اقرأ المزيدThis book presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. Cyber Physical ...
اقرأ المزيدThis book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience ...
اقرأ المزيدIt offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for ...
اقرأ المزيدOffers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving ...
اقرأ المزيدThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
اقرأ المزيدThis book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of ...
اقرأ المزيدThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
اقرأ المزيدDescribes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
اقرأ المزيدThis book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
اقرأ المزيد