You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book provides a comprehensive overview of cyber security in Industry 5.0, data security in emerging technologies, block chain technology, cloud computing security, evolving IoT and OT threats, and considerable data integrity in healthcare. The impact of security risks on various sectors is explored including artificial intelligence in national security, quantum com-puting for security, and AI-driven cyber security techniques. It explores how cyber security is applied across different areas of human life through computational modeling. The book concludes by presenting a roadmap for securing computing environments, addressing the complex interplay between advanced technologies and emerging...
Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats...
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
Software evolution is a time-consuming and costly process due to its complex architecture. Software designers need to produce software that is effective as well as durable. Durability and effectiveness of software are the foremost priorities and challenges for developers. This book comprises real-life case studies of durability issues and their solutions that bring to light loopholes and show how to fix them, to enhance durability. Existing literature on software durability tells us that the first step is to recognise the problem. It gives information about durability, risk, estimation, knowledge, and governance based on five main characteristics: dependability, trustworthiness, usability, s...
Artificial intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of...
Artificial Intelligence (AI) and the Internet of Things (IoT) are growing rapidly in today’s business world. In today's era, 25 billion devices, including machines, sensors, and cameras, are connected and continue to grow steadily. It is assumed that in 2025, 41.6 billion IoT devices will be connected, generating around 79.4 zettabytes of data. IoT and AI are intersecting in various scenarios. IoT-enabled devices are generating a huge amount of data, and with the help of AI, this data is used to build various intelligent models. These intelligent models are helpful in our daily lives and make the world smarter. Artificial Intelligence in Cyber Physical Systems: Principles and Applications addresses issues related to system safety, security, reliability, and deployment strategies in healthcare, military, transportation, energy, infrastructure, smart homes, and smart cities.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent Interactive Technologies and Multimedia, IITM 2013, held in Allahabad, India, in March 2013. The 15 revised full papers and the 12 revised short papers were carefully reviewed and selected from more than 90 submissions. The papers present the latest research and development in the areas of intelligent interactive technologies, human-computer interaction and multimedia.
This book constitutes the refereed proceedings of the First International Conference on Smart Trends in Information Technology and Computer Communications, SmartCom 2016, held in Jaipur, India, in August 2016. The 106 revised papers presented were carefully reviewed and selected from 469 submissions. The papers address issues on smart and secure systems; technologies for digital world; data centric approaches; applications for e-agriculture and e-health; products and IT innovations; research for knowledge computing.
The text discusses fundamental, advanced concepts and applications of robotics and autonomous systems. It further discusses important topics, such as robotics techniques in the manufacturing sector, applications of smart autonomous systems in the healthcare sector, resource optimization in mobile robotics, and smart autonomous transport systems. Features Covers design and application aspects of robotic systems for implementing the concepts of smart manufacturing with reduced human intervention, better accuracy, and enhanced production capacity. Discusses techniques including supervised learning, unsupervised learning, and reinforced learning with real-life examples. Highlights a unified inte...
This reference text discusses advances in wireless communication, design challenges, and future research directions to design reliable wireless communication. The text discusses emerging technologies including wireless sensor networks, Internet of Things (IoT), cloud computing, mm-Wave, Massive MIMO, cognitive radios (CR), visible light communication (VLC), wireless optical communication, signal processing, and channel modeling. The text covers artificial intelligence-based applications in wireless communication, machine learning techniques and challenges in wireless sensor networks, and deep learning for channel and bandwidth estimation during optical wireless communication. The text will be useful for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, and electronics and communication engineering.