This book addresses two aspects— Impact of research: How is the research on ICTs in the Global South playing a role in ...
Lee masThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Lee masExplores the economics and technology of AI, IOT, and 5G integration Delivers a comprehensive technological and economic ...
Lee masA further important component of machine intelligence is a kind of “structural uniformity” giving room and possibility ...
Lee masExplores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Lee masPresents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, ...
Lee masThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
Lee masThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Lee masDescribes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Lee masThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Lee masThis book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It ...
Lee masThis book presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. Cyber Physical ...
Lee masThis book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience ...
Lee masIt offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for ...
Lee masOffers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving ...
Lee masThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Lee masThis book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of ...
Lee masThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Lee masDescribes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Lee masThis book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
Lee mas