You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As cybersecurity threats continue to grow in scale and complexity, it is crucial to explore new and innovative solutions to combat them. The application of computer vision (CV) techniques in cybersecurity offers a promising solution to protect sensitive data and systems from malicious attacks. By leveraging CV algorithms, cybersecurity professionals and researchers can design more efficient and effective cybersecurity solutions, making them better equipped to handle the growing number of cyber threats. Global Perspectives on the Applications of Computer Vision in Cybersecurity is a comprehensive guide that offers practical insights into the principles and techniques of computer vision for cy...
In today's highly competitive and rapidly evolving global landscape, the quest for efficiency has become a crucial factor in determining the success of organizations across various industries. Data Envelopment Analysis (DEA) Methods for Maximizing Efficiency is a comprehensive guide that delves into the powerful mathematical tool of DEA, is designed to assess the relative efficiency of decision-making units (DMUs), and provides valuable insights for performance improvement. This book presents a systematic overview of DEA models and techniques, from fundamental concepts to advanced methods, showcasing their practical applications through real-world examples and case studies. Catering to a bro...
In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and frequency, jeopardizing sensitive information, financial assets, and critical infrastructure. Amidst this escalating threat landscape, there's a pressing need for comprehensive solutions to safeguard digital assets and ensure the integrity, confidentiality, and availability of data. Traditional security measures are proving inadequate in the face of evolving cyber threats, necessitating innovative approaches to cybersecurity. Innovations in Moder...
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the ...
This book constitutes the proceedings of the 4th edition of the Computer Science Research Days on contributions of computer science research and digital innovations for the benefit of endogenous development for a Burkina Faso emerging, JRI 2021, held Virtually and presently, on November 11-13, 2021. This event, organized by the non-profit association « RECIF » (https://recifaso.org/), aims to provide a platform for scientifics, students, developers and practitioners in digital research and innovations to present, learn and discuss on endogenous development. The technical program of JRI 2021 consisted of eight (8) full accepted papers that were carefully reviewed and selected from twenty (2...
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2021, held in Zanzibar, Tanzania, in December 2021. The 31 full papers presented were carefully selected from 78 submissions. The papers discuss issues and trends, resent research, innovation and experiences related to e-Infrastructure and e-Services along with their associated policy and regulations with a deep focus on developing countries. In recognition of the challenges imposed by the COVID-19 pandemic, the conference organized a workshop to share experience on digital leaning and teaching at the time of pandemic, which garnered 3 papers.
The 5th edition of the "Journée de Recherche en Informatique" (JRI 2022), the main annual Computer Science Research Days, hosted this year by New Dawn University and Organized by the "Réseau des Enseignants Chercheurs et chercheurs en Informatique du Faso" (RECIF). It took place on November 24-26, 2022, in Ouagadougou, Burkina Faso. JRI 2022 was held as a hybrid event and brought an opportunity between local and international academics or experts in Information Technology to discuss the latest research results in many topics such as Machine Learning, GIS, IOT, VANET, object detection and their applications in precision agriculture, traffic saturation, energy optimization.
In the digital age, smart grids stand as the backbone of modern energy systems, facilitating efficient energy distribution and management. However, this sophistication comes at the cost of heightened vulnerability to cyber threats. Standing on the precipice of a hyper-connected future, the inadequacies of current cybersecurity measures loom large, demanding urgent attention from academic scholars and industry experts. 5G and Fiber Optics Security Technologies for Smart Grid Cyber Defense addresses the challenges of securing smart grid systems through communication technologies. The book navigates through 5G wireless and fiber optics, offering a nuanced understanding of their application in t...
The advent of 6G technology introduces significant security challenges that must be addressed to ensure its safe and effective implementation. The increased complexity of 6G infrastructure, encompassing a vast array of devices and networks, expands the potential attack surface, making it more vulnerable to cyber threats. Privacy concerns are heightened with the massive data flow, necessitating stringent protection measures. These rapid developments are outpacing current educational frameworks, highlighting the need for updated programs to equip cybersecurity professionals with the skills to address these challenges. 6G Security Education and Multidisciplinary Implementation explores the critical intersection of technology, security, and education. It provides insights into the implementation of 6G technologies as well as frameworks for security education. Covering topics such as 6G education, learning experience, and privacy concerns, this book is a valuable resource for educators, academicians, scholars, security experts, post-graduate students, pre-service teachers, industry professionals, and researchers.