These days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers.
The book focuses on the open challenges associated with the convergence of the Internet of Things and Artificial Intelligence, as accommodated in 6G architecture.
Embark on a journey through the Agile-Enterprise Solution Architecture (A-ESA) framework with this in-depth guide designed to provide a structured approach to IT solution modeling.
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
This book gathers high-quality research papers presented at the 7th International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2022) organized by the Department of Computer Science and Engineering, DRIEMS (Autonomous) Engineering College, Odisha, India, during December 23-24, 2022.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations that local devices are unable to handle.
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations that local devices are unable to handle.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took place Bratislava, Slovakia, October 24-26, 2023.
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took place Bratislava, Slovakia, October 24-26, 2023.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.