This book addresses two aspects— Impact of research: How is the research on ICTs in the Global South playing a role in ...
Lire la suiteThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Lire la suiteExplores the economics and technology of AI, IOT, and 5G integration Delivers a comprehensive technological and economic ...
Lire la suiteA further important component of machine intelligence is a kind of “structural uniformity” giving room and possibility ...
Lire la suiteExplores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Lire la suitePresents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, ...
Lire la suiteThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
Lire la suiteThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Lire la suiteDescribes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Lire la suiteThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Lire la suiteThis book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It ...
Lire la suiteThis book presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. Cyber Physical ...
Lire la suiteThis book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience ...
Lire la suiteIt offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for ...
Lire la suiteOffers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving ...
Lire la suiteThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Lire la suiteThis book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of ...
Lire la suiteThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Lire la suiteDescribes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Lire la suiteThis book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
Lire la suite