This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure ...
اقرأ المزيد
Offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and ...
اقرأ المزيد
Analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights ...
اقرأ المزيد
Discusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...
اقرأ المزيدWireless communication and networking based on AI concepts and techniques are explored in this book, specifically focusing ...
اقرأ المزيد
Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
اقرأ المزيد
Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيد
This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
اقرأ المزيدThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
اقرأ المزيد
This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...
اقرأ المزيد
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
اقرأ المزيد
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
اقرأ المزيد
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيد
This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
اقرأ المزيدProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
اقرأ المزيد
This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...
اقرأ المزيد
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيد
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيد