You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents recent advances on IoT and connected technologies. We are currently in the midst of the Fourth Industrial Revolution, and IoT is having the most significant impact on our society. The recent adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., has made the Internet of things (IoT) step out of its infancy. Internet of things (IoT) and connecting technologies are already having profound effects on the different parts of society like the government, health care, businesses, and personal lives. 6th International Conference on Internet of Thi...
This edited volume on machine learning and big data analytics (Proceedings of ICMLBDA 2022) is intended to be used as a reference book for researchers and professionals to share their research and reports of new technologies and applications in Machine Learning and Big Data Analytics like biometric Recognition Systems, medical diagnosis, industries, telecommunications, AI Petri Nets Model-Based Diagnosis, gaming, stock trading, Intelligent Aerospace Systems, robot control, law, remote sensing and scientific discovery agents and multiagent systems; and natural language and Web intelligence. The intent of this book is to provide awareness of algorithms used for machine learning and big data in the advanced Scientific Technologies, provide a correlation of multidisciplinary areas and become a point of great interest for Data Scientists, systems architects, developers, new researchers and graduate level students. This volume provides cutting-edge research from around the globe on this field. Current status, trends, future directions, opportunities, etc. are discussed, making it friendly for beginners and young researchers.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
This book constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in Hyderabad, India, in June 2010.
Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to “emerged and exciting new computing paradigm of Ubiquitous Computing”, includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitou...
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.
In the age of technological advancement, including the emergence of artificial intelligence, big data, and the internet of things, the need for privacy and protection has risen massively. This phenomenon has led to the enforcement of two major legal directives in the European Union (EU) that aim to provide vigorous protection of personal data. There is a need for research on the repercussions and developments that have materialized with these recent regulations and how the rest of the world has been affected. Personal Data Protection and Legal Developments in the European Union is an essential reference source that critically discusses different aspects of the GDPR and the Law Enforcement Di...
It is my great pleasure to introduce this special issue of LNSV comprising the sci- tific publications presented at ehealth 2009: The second Congress on Electronic Healthcare for the 21st Century, which took place in Istanbul, Turkey during September 23–25, 2009. Building on the first ehealth 2008 congress held in London, UK, the key topic of ehealth 2009 was investigating a realistic potential of the Internet in providing e- dence-based healthcare information and education to patients and global users. The proudly defined aim of ehealth 2009 –– bringing together the three medical sectors: academia, industry and global healthcare institutions –– was met and made the c- gress a trul...