You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addres...
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. This book explores algorithms, protocols, and system design principles of key smart technologies including cloud computing and the internet of things. • Discusses the system design principles in cloud computing along with artificial intelligence, machine learning, and data analytics applications • Presents blockchain-based solutions, cyber-physical system applications, and deep learning approaches to solving practical problems • Highlights important concepts including the cloud of things architecture, cloud service manage...
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data sec...
This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these confe...
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lig...
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry.
The text comprehensively discusses smart grid operations and the use of big data analytics in overcoming the existing challenges. It covers smart power generation, transmission, and distribution, explains energy management systems, artificial intelligence, and machine learning–based computing. •Presents a detailed state-of-the-art analysis of big data analytics and its uses in power grids. • Describes how the big data analytics framework has been used to display energy in two scenarios including a single house and a smart grid with thousands of smart meters. •Explores the role of the internet of things, artificial intelligence, and machine learning in smart grids. • Discusses edge ...
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provid...