Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.
The book proposes solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. New insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes are discussed.
This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.
This book covers physical layer security (PHY) for wireless sensing and radio environment concepts along with the related security implications in terms of eavesdropping, disruption, manipulation and, in general, the exploitation of wireless sensing by unauthorised users.
This is a timely review of the fundamentals, the latest developments and the diverse applications of nature-inspired algorithms in cyber security and resiliency. Based on concepts from natural processes, phenomena and organisms, it presents novel methodologies to cope with cyber security challenges.
In this edited book, the authors delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. They explain how the accountability principle impacts IoT development by presenting empirical studies of accountability in action.
This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.