This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms.
This book constitutes revised papers from the eight workshops which were held during June 2021 at the 24th International Conference on Business Information Systems, BIS 2021.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts.
This book constitutes the refereed proceedings of the 10th International Conference on Culture and Computing, C&C 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication.
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks.
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities.
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings.
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner.
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved.
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc.
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021.
This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022.
This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physical products.
This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.
AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels.
The age of Advanced Air Mobility (AAM) is upon us, and in ushering new ways to connect and travel, this wave of technology has been compared to GPS and cloud computing.
This book constitutes the proceedings of the 9th International Workshop on Code-Based Cryptography, CBCrypto 2021, which was held during June 21-22, 2021.
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities.
This book gathers the latest advances, innovations, and applications in the field of sensing technology, as presented by international researchers and engineers at the 14th International Conference on Sensing Technology (ICST), held in Chennai, India on January 17-19, 2022.
This handbook aims at modernizing the current state of civil engineering and firefighting, especially in this era where infrastructures are reaching new heights, serving diverse populations, and being challenged by unique threats.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity.
This book constitutes the refereed post-conference proceedings of the 3rd EAI International Conference on Sustainable Energy for Smart Cities, SESC 2021, held in November 2021.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.