This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpack...Daugiau...
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpack...Daugiau...
Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak
(Išleidimo metai: 06-Dec-2023, EPUB+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781003810278)
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a va...Daugiau...
Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Hakak
(Išleidimo metai: 06-Dec-2023, PDF+DRM, Leidėjas: Taylor & Francis Ltd, ISBN-13: 9781003810186)
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a va...Daugiau...
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and select...Daugiau...
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and select...Daugiau...
Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a cruci...Daugiau...
Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a cruci...Daugiau...
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers...Daugiau...
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers...Daugiau...
This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advanc...Daugiau...
This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advanc...Daugiau...
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.The presented 26 full papers and 2 short papers were thoroughly revi...Daugiau...
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.The presented 26 full papers and 2 short papers were thoroughly revi...Daugiau...
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, pr...Daugiau...
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, pr...Daugiau...
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, reporting on latest advances on topics ranging from software security to c...Daugiau...
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, reporting on latest advances on topics ranging from software security to c...Daugiau...
This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment-sensors, blockchain, cloud computing, an...Daugiau...
This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment-sensors, blockchain, cloud computing, an...Daugiau...
This book constitutes the refereed proceedings of the 9th International Conference on Computational Data and Social Networks, CSoNet 2020, held in Dallas, TX, USA, in December 2020.The 20 full papers were carefully reviewed and selected from 83 submi...Daugiau...
This book constitutes the refereed proceedings of the 9th International Conference on Computational Data and Social Networks, CSoNet 2020, held in Dallas, TX, USA, in December 2020.The 20 full papers were carefully reviewed and selected from 83 submi...Daugiau...
Haojun Huang, Lizhe Wang, Yulei Wu, Kim-Kwang Raymond Choo
Serija: Computing and Networks
(Išleidimo metai: 30-Nov-2020, PDF+DRM, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781785618741)
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic...Daugiau...
Haojun Huang, Lizhe Wang, Yulei Wu, Kim-Kwang Raymond Choo
Serija: Computing and Networks
(Išleidimo metai: 30-Nov-2020, EPUB+DRM, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781785618741)
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic...Daugiau...
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, reporting on the latest advances on topics ranging from software security...Daugiau...
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, reporting on the latest advances on topics ranging from software security...Daugiau...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure...Daugiau...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure...Daugiau...
Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensic challenges and approaches is the best way users and organizations can prepare for potential negative events. Adopting an experiential learning approach,...Daugiau...
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this...Daugiau...
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this...Daugiau...
?This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P appli...Daugiau...
?This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P appli...Daugiau...
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicio...Daugiau...
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicio...Daugiau...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short...Daugiau...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short...Daugiau...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short...Daugiau...
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short...Daugiau...
This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2019, held in Naples, Italy, in September 2019.The 32 full papers and 8 short papers were carefully reviewed and...Daugiau...
This book constitutes the refereed proceedings of the 16th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2019, held in Naples, Italy, in September 2019.The 32 full papers and 8 short papers were carefully reviewed and...Daugiau...
This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019.The volume presents 52 full papers, which were carefully reviewed and sel...Daugiau...
This book constitutes the refereed proceedings of the 7th International Conference on Smart City and Informatization, iSCI 2019, held in Guangzhou, China, in November 2019.The volume presents 52 full papers, which were carefully reviewed and sel...Daugiau...
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
Serija: Computing and Networks
(Išleidimo metai: 30-Sep-2019, PDF+DRM, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781785617485)
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a compre...Daugiau...
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
Serija: Computing and Networks
(Išleidimo metai: 30-Sep-2019, EPUB+DRM, Leidėjas: Institution of Engineering and Technology, ISBN-13: 9781785617485)
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a compre...Daugiau...
These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, and report on the latest advances in areas ranging from software security to cyber at...Daugiau...
These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summits Research Track, and report on the latest advances in areas ranging from software security to cyber at...Daugiau...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able...Daugiau...
This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able...Daugiau...
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also lear...Daugiau...