Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.
This book constitutes the refereed proceedings of the First International Workshop, FL 2022, Held in Conjunction with IJCAI 2022, held in Vienna, Austria, during July 23-25, 2022.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2022), held at tThe Karkonosze University of Applied Sciences, Poland, during June 2022.
The book is a compilation of high-quality scientific papers presented at the 4th International Conference on Computer & Communication Technologies (IC3T 2022).
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization.
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
Mit dem Thema Datenschutz müssen sich alle Unternehmen auseinandersetzen, vom Solo-Selbstständigen über kleine und mittlere Betriebe bis zum Großunternehmen.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
This book presents mathematical models of various renewable energy sources (RESs) such as wind energy systems, solar PV systems, battery energy storage systems, pumped-storage hydropower, biomass, and electric vehicles (EVs).
The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software, and network connections to gather and communicate data.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.
Mit diesem Handbuch identifizieren Sie Risiken, bauen wegweisendes effizienzförderndes Handlungswissen auf und sichern so Ihr Unternehmen sowie seine Prozesse, Ressourcen und die Organisation ab.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book presents the security and privacy challenges of the smart home following the logic of "e;terminal device - voice interface - application platform"e;.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.