This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This two-volume set LNICST652-653 constitutes the refereed proceedings of the EAI 16th International Conference on International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2024, which took place in Abidjan, Côte d’Ivoire, in November 2024.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
This book introduces students to the challenges related to international crime and punishment and the ways that criminal justice systems have sought to confront them.
This book introduces students to the challenges related to international crime and punishment and the ways that criminal justice systems have sought to confront them.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence is reshaping the landscape of cybersecurity and privacy protection in an era of rapid digital transformation.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
This book provides an in-depth comparative study of legal responses to cyberterrorism in China and the UK to establish whether the relationship between legal systems and legal responses is necessary or contingent in the case of counter-cyberterrorism.
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.