You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011. The 37 revised full papers presented were carefully selected from numerous submissions. Conference papers promote research and development activities of innovative applications and methodologies and applied technologies.
ISC 2022 is dedicated to the Niti Aayog policies to promote sustainability through exchange of ideas emerging out of the academia. The ISC is an annual conference that is held in virtual mode until COVID restrictions on travel exist. The vision of the conference is to capacitate Academia with the necessary ideas that provide insights of the grassroot level development to various stakeholders of the Niti-Aayog policies. Towards this goal, the conference creates a conjunction of various stakeholders of Niti-Aayog policies that include- academic institutions, government bodies, policy makers and industry. The ISC organizers make concerted efforts to promote academic research that would technological, scientific, management & business practices, and insights into policy merits & disruptions. The framework of exchange of ideas is geared towards adoption of deep technologies, fundamental sciences & engineering, energy research, energy policies, advances in medicine & related case studies. This framework enables the round table discussions between the academia, industry and policy makers through its range of plenary and keynote speakers.
​This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity ...
This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications (MIDAS 2022), held on October 28 and 29, 2022, at the University of Versailles—Paris-Saclay, France. The book covers applications in various fields like data science, machine intelligence, image processing, natural language processing, computer vision, sentiment analysis, and speech and gesture analysis. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber-physical system, and smart agriculture. The book is a good reference for computer science engineers, lecturers/researchers in the machine intelligence discipline, and engineering graduates.
The Ethics of Artificial Intelligence develops the theses that AI is an unprecedented divorce between agency and intelligence and, on this basis, that AI as a new form of agency can be harnessed ethically and unethically. Luciano Floridi argues in favour of a marriage between the Green of environmentalism and the Blue of our digital technologies.
Examining the various sources of law that form this area of growing academic and practical importance, International Law and Transnational Organised Crime provides readers with a thorough understanding of the key concepts and legal instruments in international law governing transnational organised crime.
This book is essential for understanding the transformative integration of cyber-physical systems in smart grids, providing valuable insights that will shape the future of sustainable energy production and distribution. A novel modeling methodology that blends cyber and physical components is a significant advancement for future energy systems. A Cyber-Physical System (CPS) is an integrated component of physical microgrids that combines computers, wireless connections, and controls to create a holistic solution. As a result of cyber-physical systems, a new generation of engineering systems incorporating wireless communication has begun to emerge. Despite that there are various major CPS syst...
This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy...