This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact analysis, and security concerns.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book is a collection of high-quality research papers presented at 8th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Minnan Science and Technology College, China and technically co-sponsored by Nanjing University of Information Science and Technology, China.
Get 100% coverage of the latest CompTIA Network+ N10-009 exam objectives for targeted preparation and unlock online access to 2 full-length mock exams and 400 challenging practice questionsKey FeaturesLearn from Ian Neil, bestselling author and world-class CompTIA trainerBuild a solid foundation in networking with hands-on skills that advance your careerTest your readiness with practice tests that mirror the real examSave on certification costs with an exclusive 12% Network+ exam discount voucher with this bookBook DescriptionLooking to pass the CompTIA Network+ N10-009 exam and advance your IT career?
Get 100% coverage of the latest CompTIA Network+ N10-009 exam objectives for targeted preparation and unlock online access to 2 full-length mock exams and 400 challenging practice questionsKey FeaturesLearn from Ian Neil, bestselling author and world-class CompTIA trainerBuild a solid foundation in networking with hands-on skills that advance your careerTest your readiness with practice tests that mirror the real examSave on certification costs with an exclusive 12% Network+ exam discount voucher with this bookBook DescriptionLooking to pass the CompTIA Network+ N10-009 exam and advance your IT career?
This book is a collection of high-quality research papers presented at 8th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Minnan Science and Technology College, China and technically co-sponsored by Nanjing University of Information Science and Technology, China.
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.
This book constitutes revised selected papers of the 8th International Conference on Mobile Internet Security, MobiSec 2024, held in Sapporo, Japan, during December 17–19, 2024.
Recent advancements in medical and industrial Internet of Things have raised security concerns, as vulnerabilities can impact critical systems, workflows, privacy, and safety.
This book constitutes the proceedings of the 19th International Conference on Provable and Practical Security, ProvSec 2025, which took place in Yokohama, Japan, during October 10–12, 2025.
This book constitutes the proceedings of the 19th International Conference on Provable and Practical Security, ProvSec 2025, which took place in Yokohama, Japan, during October 10–12, 2025.
Recent advancements in medical and industrial Internet of Things have raised security concerns, as vulnerabilities can impact critical systems, workflows, privacy, and safety.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the proceedings of the 3rd International Conference on Data Security and Privacy Protection, DSPP 2025, held in Xi'an, China, during October 16–18, 2025.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
The book is a collection of high-quality peer-reviewed research papers presented in the Tenth International Conference on Cyber Security, Privacy in Communication Networks (ICCS 2024) held at Cardiff Metropolitan University, Cardiff, United Kingdom during 9 - 10 December 2024.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20–22, 2025.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.