This book offers readers an innovative perspective on how intelligent networks can evolve beyond simple device-to-device communication, enabling social interaction, adaptive learning, and predictive intelligence across various domains.
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book compiles the proceedings of the 16th International Conference on Complex Networks (CompleNet 2025), a distinguished gathering that has united researchers and practitioners from diverse fields since 2009.
This book seeks to examine the profound transformations brought about by the convergence of human-centered principles and advancing cyber-technologies across diverse fields, including industry, environment, healthcare, and interactive media.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book compiles select articles presented during the Fifth Meeting for Dissemination and Research in the Study of Complex Systems and their Applications (EDIESCA 2024).
This book compiles select articles presented during the Fifth Meeting for Dissemination and Research in the Study of Complex Systems and their Applications (EDIESCA 2024).
This book presents a general approach to block and recursive filtering, identification, and control, using signal observations processing techniques, and among others provides to the reader these results:The new version of least square algorithm that is speeded up without changing its adaptive characteristics, increasing the parallelism in algorithm.
In an increasingly interconnected and complex world, businesses face environmental, social, and economic challenges that demand thoughtful reflection and a shift in operational approaches.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025.
This book includes high-quality papers presented at the Third International Conference on Data Science and Management (ICDSM 2024), organized by the Gandhi Institute for Education and Technology, Bhubaneswar, from December 13–14, 2024.
This book compiles the proceedings of the 16th International Conference on Complex Networks (CompleNet 2025), a distinguished gathering that has united researchers and practitioners from diverse fields since 2009.
This book provides an in-depth study of queueing game models, involving interdisciplinary fields such as queueing theory, game theory, optimization theory, statistics, and economics.
This book presents a comprehensive exploration of the dynamical system approach in numerical linear algebra, with a special focus on computing generalized inverses, solving systems of linear equations, and addressing linear matrix equations.
Model Predictive Control (MPC), the classic textbook for students and practitioners seeking deep understanding of advanced control systems, is now revised, updated and reorganized in a streamlined third edition.
Drawing on interviews with over 50 women in rural villages in Ghana, this book analyzes the poverty of older, rural, and illiterate women in Ghana within the framework of the feminization of poverty.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on Blockchain and Trustworthy Systems, BlockSys 2025, held in Zhuhai, China, during May 30–31, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book offers readers an innovative perspective on how intelligent networks can evolve beyond simple device-to-device communication, enabling social interaction, adaptive learning, and predictive intelligence across various domains.
This book is a comprehensive exploration of the fundamental principles and contemporary applications of cyber-physical systems (CPS) in various engineering disciplines.
This edited volume brings together scholars, feminist activists, policymakers, civil society and government practitioners to discuss the recurrent challenges and struggles women in Zimbabwe and Africa continue to face, and more importantly, to show how new solidarities (beyond generations and geopolitical spaces) have emerged to try and deal with these multifarious challenges.
The first full-length English translation of the 1909 book from the revolutionary Russian Marxist feminist Alexandra Kollontai on the state of the contemporary bourgeois women's movement and the role of working-class women in the struggle for women's equality.
This book offers an exploration of the intersection between ADHD diagnosis, attachment theory, and epistemic injustice, centring the lived experiences of mothers who have been blamed for their child's ADHD diagnosis.
This book offers an exploration of the intersection between ADHD diagnosis, attachment theory, and epistemic injustice, centring the lived experiences of mothers who have been blamed for their child's ADHD diagnosis.