Search Results
-
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of comput... More
Language: ENGCopyright: 2018 -
Secure Searchable Encryption and Data Management
by Brij B. Gupta • MamtaWith the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Sto... More
Language: ENGCopyright: 2021 -
Cloud Security: Concepts, Applications and Perspectives (Cyber Ecosystem and Security)
by Brij B GuptaCloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of clo... More
Language: ENGCopyright: 2021 -
Internet of Things Security: Principles, Applications, Attacks, and Countermeasures
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, an... More
Language: ENGCopyright: 2020 -
Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies
With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evoluti... More
Language: ENGCopyright: 2021 -
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (Cyber Ecosystem And Security Ser.)
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer net... More
Language: ENGCopyright: 2019 -
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are imp... More
Language: ENGCopyright: 2021 -
Advanced Circuits and Systems for Healthcare and Security Applications
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices. The increasing use of VLSI circuits dealing with highly sensitive information, such as healthcare info... More
Language: ENGCopyright: 2023 -
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of app... More
Language: ENGCopyright: 2021 -
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with exa... More
Language: ENGCopyright: 2020 -
Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted... More
Language: ENGCopyright: 2021 -
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence #1030)
This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologi... More
Language: ENGCopyright: 2022 -
Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data #95)
by Wojciech Mazurczyk • Brij B. Gupta • Ahmed A. Abd El-Latif • Bassem Abd-El-Atty • Salvador E. Venegas-AndracaThis book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transf... More
Language: ENGCopyright: 2022