You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart cyber ecosystems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications.
In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous—it’s imperative. Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions serves as a crucial bridge, connecting the dots between the present knowledge base and the fast-paced developments in this dynamic field. Through a collection of meticulous research and expert insights, this book dissects various facets of digital forensics and cyber security, providing readers with a comprehensive look at current trends and future possibilities. Distinguished by its in-depth analysis and forward-looking perspective, this...
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2021 was de...
The Social Internet of Things (SIoT) has become a hot topic in academic research. It employs the theory of social networks into the different levels of the Internet of Things (IoTs) and has brought new possibilities for the development of IoTs. Essentially, the SIoT is a subset of IoTs. It uses intelligent hardware and humans as the node, a social network as the organization type, the social relationship between things, things and humans, and between humans, formatting research methods and models with social network characteristics to realize the connection, service, and application of the IoTs. Moreover, SIoT is a form of realization of technology, architecture, and application of the IoTs ...
The National Conference on Recent Innovations in Emerging Computer Technologies (NCRIECT-2023) was held on the 9th and 10th of May 2023 at Kalinga University, Raipur. The conference was aimed at bringing together researchers, scholars, academicians, and industry professionals to discuss the latest advancements and innovations in the field of computer technologies. The conference began with an opening ceremony, where the chief guests and dignitaries were welcomed by the organizers. The keynote address was delivered by a renowned expert in the field of computer technologies, who spoke about the importance of innovation in driving progress and growth in the industry. This was followed by techni...
The use of mobile devices in medical care settings and by wellness professionals has influenced and changed many aspects of clinical practice. Mobile devices have become ubiquitous in these settings, leading to rapid growth in the development of medical apps. Contemporary Applications of Mobile Computing in Healthcare Settings is a critical scholarly resource that explores the benefits of using mobile devices and apps in the medical field and examines the shortcomings in the validation practices regarding these technologies. Featuring coverage on a wide range of topics such as smart healthcare, patient surveillance, and body fitness monitoring, this book is geared toward academicians, nurses, medical professionals, practitioners, and students seeking current research on the quality and safety of the apps currently available for use by medical care professionals.
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy t...
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ agendas. Such a transformation stimulates innovation in new products and services, the digital transformation of processes, and the creation of new business models and ecosystems. In the world of manufacturing, Industry 4.0 is based on various technological advances, among which we can mainly cite CPS (cyber-physical systems), IoT (Internet of Things), and IoS (internet of services). While engaging, this fourth wave also brings significant challenges for manufacturers. Business operations and the supply chain are becoming more vulnerable to cyber threats. Security Engineer...