The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.