This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
This book constitutes the proceedings of the 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, which took place in Rennes, France, during June 18–19, 2025.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019.
There is a growing need for insights and practical experiences in the evolving field of cyber security for business analytics a need addressed by Cyber Security in Business Analytics.
There is a growing need for insights and practical experiences in the evolving field of cyber security for business analytics a need addressed by Cyber Security in Business Analytics.
In an age of rapid technological progress and digital transformation, the convergence of voting systems and biometric authentication stands as one of the most pressing areas for innovation and security.
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.
This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
This book delves into the revolutionary ways in which AI-driven innovations are enhancing every aspect of cybersecurity, from threat detection and response automation to risk management and endpoint protection.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing: A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.