Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same but the outcomes can be equally devastating.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN.
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.