Electronic Books

Total Books: 1 - 18 /18
Adaptive Autonomous Secure Cyber Systems

This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure ...

Lire la suite
Artificial Intelligence and Data Mining Approaches in Security Frameworks / Neeraj Bhargava, Ritu Bhargava, Pramod Singh Rathore, Rashmi Agrawal

Offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and ...

Lire la suite
Artificial Intelligence and National Security / Reza Montasari; Annie Benzie; Océane Dieu; Vinden Wylde; Edmond Prakash; Chaminda Hewage; Jon Platts; Kate Gunton; Megan Thomas-Evans; Sarah Klingberg; Jim Seaman; Ellie Moggridge; Shasha Yu; Fiona Carroll; Megan Wilmot McIntyre; Sandra Smart-Akande; Joel Pinney; Imtiaz Khan; Thanuja Mallikarachchi

Analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights ...

Lire la suite
Artificial Intelligence for Cloud and Edge Computing / Sanjay Misra

Discusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...

Lire la suite
NoIMG
Artificial Intelligent Techniques for Wireless Communication and Networking / R. Kanthavel , K. Anathajothi

Wireless communication and networking based on AI concepts and techniques are explored in this book, specifically focusing ...

Lire la suite
Blockchain and Other Emerging Technologies for Digital Business Strategies / Hamid Jahankhani, David V. Kilpin

Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...

Lire la suite
Cyber Security : Critical Infrastructure Protection / Martti Lehto, Pekka Neittaanmäki

Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...

Lire la suite
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

Lire la suite
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Lire la suite
Emerging Technologies in Computing : Third EAI International Conference, iCETiC 2020, London, UK, August 19–20, 2020, Proceedings

This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...

Lire la suite
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

Lire la suite
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

Lire la suite
Secure Data Science : Integrating Cyber Security and Data Science / Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan

Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...

Lire la suite
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Lire la suite
NoIMG
Sustainable Construction in the Era of the Fourth Industrial Revolution / Ayodeji Emmanuel Oke, Clinton Aigbavboa, Seyi S. Stephen, Wellington Didibhuku Thwala

Provides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...

Lire la suite
The Huawei and Snowden Questions

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...

Lire la suite
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Lire la suite
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Lire la suite
Total Books: 1 - 18 /18