Search
Search Results
-
Maximizing intrusion detection efficiency for IoT networks using extreme learning machine
Intrusion Detection Systems (IDSs) are crucial for safeguarding modern IoT communication networks against cyberattacks. IDSs must exhibit exceptional...
-
A novel trusted hardware-based scalable security framework for IoT edge devices
The Internet of Things (IoT) devices are pervasively deployed and embedded into our daily lives. Over several years, the massive assimilation of IoT...
-
s2Cloud: a novel cloud-based precision health system for smart and secure IoT big data harnessing
This study aims to demonstrate a novel cloud big data system, s 2 Cloud, to enabled both smart and secure transmission and management of patient big...
-
Introduction to Machine Learning with Security Theory and Practice Using Python in the Cloud
This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying...
-
Determining critical nodes in optimal cost attacks on networked infrastructures
A wide range of critical infrastructures are connected via wide area networks as well as the Internet-of-Thing (IoT). Apart from natural disasters,...
-
Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques
In the era of automated and digitalized information, advanced computer applications deal with a major part of the data that comprises audio-related...
-
Decentralized Privacy Preservation in Smart Cities
This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities...
-
Reliability Engineering for Industrial Processes An Analytics Perspective
This book explores how transformative changes driven by the new-age economy can bring about improvements in a company's engineering and manufacturing...
-
MAC Protocol Design in Full-Duplex Enabled Wireless Networks
This book thoroughly examines the design of full-duplex medium access control (MAC) protocols in wireless networks. It is organized into three main...
-
Transforming Industry using Digital Twin Technology
This book enables readers with varying backgrounds to understand the need for Digital Twin technologies. The authors describe how digital twin...
-
High-Performance Integrated Charge Pumps Design and Novel Solutions
This book enables readers to gain a deep understanding of the challenges related to the design of a charge pump (CP). Analysis, modeling, design...
-
New Metaheuristic Schemes: Mechanisms and Applications
Recently, novel metaheuristic techniques have emerged in response to the limitations of conventional approaches, leading to enhanced outcomes. These... -
Autonomous Vehicles and Virtual Reality The New Automobile Industrial Revolution
This book concisely describes the technologies, human perception, and cognition issues relevant to autonomous vehicles. It also gives an insight in... -
The Seventh International Conference on Safety and Security with IoT SaSeIoT 2023
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took place Bratislava, Slovakia, October...
-
Critical Infrastructure Protection in the Light of the Armed Conflicts
This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to...
-
Blockchain-Based Data Security in Heterogeneous Communications Networks
This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a...
-
Channel Characterization and Modeling for Vehicular Communications
This book presents and develops comprehensive knowledge of vehicular channel characteristics and proper vehicular channel models. The studied topics... -
Applied Problems Solved by Information Technology and Software
This book explores a dynamic landscape where cutting-edge technologies are revolutionizing various domains. This captivating book delves into the...
-
Blockchain Transformations Navigating the Decentralized Protocols Era
This book provides a guide for those looking to understand the potential of blockchain technology and its impact on various industries. The book...
-
Adaptive On- and Off-Earth Environments
This volume investigates the challenges and opportunities for designing, manufacturing and operating off-Earth infrastructures in order to establish...