You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data sec...
This book includes original, peer-reviewed research papers from the International Conference on Internet of Things, Communication and Intelligent Technology (IoTCIT) 2022. It contains the application of communication and IoT engineering in the age of intelligent technology+ from the standpoint of disciplinary integration, combining theory and associated IoT and intelligent technology algorithms. The topics cover the full range of IoT solutions, from IoT to network security, and focus on many forms of communication, such as Next Generation (6G) Mobile Communication, D2D, and M2M Communication. Additionally, it examines Intelligent Technology, with a focus on Information System Modeling and Simulation. It also explores Cloud Computing, Pervasive and Mobile Computing, Distributed Computing, High Performance Computing, and Ubiquitous Computing.
The edited book Intelligent Wireless Sensor Networks and Internet of Things: Algorithms, Methodologies and Applications is intended to discuss the progression of recent as well as future generation technologies for WSNs and IoTs applications through Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). In general, computing time is obviously increased when the massive data is required from sensor nodes in WSN’s. the novel technologies such as 5G and 6G provides enough bandwidth for large data transmissions, however, unbalanced links faces the novel constraints on the geographical topology of the sensor networks. Above and beyond, data transmission congestion and data...
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards. These digital technologies can transform various aspects of healthcare, leveraging advances in computing and communication power. With a new spectrum of business opportunities, AI-powered healthcare services will improve the lives of patients, their families, and societies. However, the application of AI in the healthcare field requires special attention given the direct implication with human life and well-being. Rapid progress in AI leads to the possibility o...
It is our pleasure to welcome you to the proceedings of the 13th International C- puter Society of Iran Computer Conference (CSICC-2008). The conference has been held annually since 1995, except for 1998, when it transitioned from a year-end to first-quarter schedule. It has been moving in the direction of greater selectivity (see Fig.1) and broader international participation. Holding it in Kish Island this year represents an effort to further facilitate and encourage international contributions. We feel privileged to participate in further advancing this strong technical tradition. 60 50 40 30 20 10 0 Dec 23-26 Dec 23-25 Dec 23-25 Jan 26-28 Mar 8-10 Feb 21-23 Feb 28-30 Feb 23-26 Feb 16-19 Feb 15-18 Jan 24-26 Feb 20-22 Mar 9-11 1995 1996 1997 Iran 1999 2000 2001 U of 2002 Iran 2003 2004 2005 Iran 2006 IPM, 2007 2008 Sharif U Amirkabir U of Sharif U Shahid Isfahan, Telecom Ferdowsi Sharif U Telecom Tehran Shahid Sharif U of Tech, U of Tech, Sci/Tech, of Tech, Beheshti Isfahan Res. U, of Tech, Res. Beheshti of Tech, Tehran Tehran Tehran Tehran U, Tehran Center Mashhad Tehran Center U, Tehran Kish Island Dates, Year, Venue
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addres...
This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today’s technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often re...
The industrial landscape is changing rapidly, and so is global society. This change is driven by the growing adoption of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) technologies. IIoT and AI are transforming the way industrial engineering is done, enabling new levels of automation, productivity, and efficiency. However, as IIoT and AI become more pervasive in the industrial world, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems. Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments provides a comprehensive guide to IIoT security, covering...