You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 6th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022. The 14 full papers included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: computing methodologies; information systems; network; security and privacy.
This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.
In our contemporary era, while diversity is acknowledged, true inclusion remains an elusive goal, as society grapples with multifaceted challenges. The "great resignation" and movements like #MeToo have exposed workplace culture issues, while events like Black Lives Matter protests underscored glaring disparities. Simultaneously, rapid technological advancements introduce new risks, from cyber exploitation to biased AI. These complexities demand innovative solutions that address these challenges, fostering environments of genuine respect, understanding, and collaboration. Applied Research Approaches to Technology, Healthcare, and Business, edited by Dr. Darrell Norman Burrell, emerges as a t...
Cyberfeminism and Gender Violence in Social Media is a timely and essential book that addresses the increasing violence against women on social media platforms. With the rise of digitalization and the advent of social media, women have been subjected to various forms of violence such as cyberbullying, trolling, and body shaming. This volume compiles research works on the topic of how women fall prey to social networking sites and possible remedial actions to prevent such issues. The book provides an interdisciplinary approach, making it relevant to a wide range of fields such as social science, humanities, technology, and management. It creates awareness among people, especially women, about...
This book constitutes the refereed combined proceedings of four international workshops held in conjunction with the joint 9th Asia-Pacific Web Conference, APWeb 2007, and the 8th International Conference on Web-Age Information Management, WAIM 2007, held in Huang Shan, China in June 2007: DBMAN 2007, WebETrends 2007, PAIS 2007, and ASWAN 2007.
This book constitutes the refereed proceedings of the Third International Conference on New Trends in Information and Communications Technology Applications, NTICT 2018, held in Baghdad, Iraq, in October 2018. The 18 papers presented were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections, namely: Computer networks; system and network security; machine learning; intelligent control system; communication applications; computer vision; and e-learning.
"This book presents a vital compendium of research detailing the latest case studies, architectures, frameworks, methodologies, and research on Digital Democracy"--Provided by publisher.
Innovation and creativity in organizations are pivotal to survival as human activity fuses with technological domains. Exploiting the potential of technology to use it in innovative and creative ways that change how and what humans do for the better lies within the influence of the andragogical leader. Leading by example, when andragogical leaders model the use of technology, they also model creativity, innovation, and failure as a positive learning experience. Andragogical leaders should model effective technology use daily. The Handbook of Research on Andragogical Leadership and Technology in a Modern World provides diverse perspectives, experiences, theories, and philosophies related to andragogical leadership and technology across all levels of education. Covering key topics such as transformational leadership, learning pedagogy, and instructional technology, this major reference work is ideal for policymakers, managers, industry professionals, researchers, academicians, scholars, practitioners, instructors, and students.
The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
Technologies that enable powering a device without the need for being connected with a cable to the grid are gaining attention in recent years due to the advantages that they provide. They are a commodity to users and provide additional functionalities that promote autonomy among the devices. Emerging Capabilities and Applications of Wireless Power Transfer is an essential reference source that analyzes the different applications of wireless power transfer technologies and how the technologies are adapted to fulfill the electrical, magnetic, and design-based requirements of different applications. Featuring research on topics such as transfer technologies, circuital analysis, and inductive power transfer, this book is a vital resource for academicians, electrical engineers, scientists, researchers, and industry professionals seeking coverage on device power and creating autonomy through alternative power options for devices.