We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 1,866 results
  1. Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I

    The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in...
    Serap Kurbanoğlu, Sonja Špiranec, ... Loriene Roy in Communications in Computer and Information Science
    Conference proceedings 2024
  2. Information Security Planning A Practical Approach

    This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...

    Susan Lincke
    Book 2024
  3. Cognitive Computing – ICCC 2023 7th International Conference Held as Part of the Services Conference Federation, SCF 2023 Shenzhen, China, December 17-18, 2023 Proceedings

    This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during...

    **uqin Pan, Ting **, Liang-Jie Zhang in Lecture Notes in Computer Science
    Conference proceedings 2024
  4. Decision Making and Security Risk Management for IoT Environments

    This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The...
    Wadii Boulila, Jawad Ahmad, ... Imed Riadh Farah in Advances in Information Security
    Book 2024
  5. Blockchains A Handbook on Fundamentals, Platforms and Applications

    This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The...
    Sushmita Ruj, Salil S. Kanhere, Mauro Conti in Advances in Information Security
    Book 2024
  6. Introduction to Cybersecurity A Multidisciplinary Challenge

    This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted...

    Textbook 2024
  7. Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

    Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden...
    Holger Kaschner
    Book 2024
  8. Android Malware Detection and Adversarial Methods

    The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...

    Weina Niu, **aosong Zhang, ... Jiacheng Gong
    Book 2024
  9. IoMT Applications Perspectives: From Opportunities and Security Challenges to Cyber-Risk Management

    The Internet of Things (IoT) paradigm is gaining popularity since it promotes the development of several smart and innovative applications....
    Sondes Ksibi, Faouzi Jaidi, Adel Bouhoula in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  10. Implementation of the C4.5 Algorithm in the Internet of Things Applications

    The Internet of Things changes how people perform their daily activities. With data mining techniques, the Internet of Things assists users to...
    Apriandy Angdresey, Lanny Sitanayah, ... Timothy Matthew Immanuel Sumajow in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  11. Multivariate Procedure for Modeling and Prediction of Temperature in Punjab, Pakistan

    Climate study often relies upon global climate models (GCM) to project future scenarios of change in climate behavior. This study aims to refine GCM...
    Bushra Kanwal, Zeeshan Ashraf, ... Mandar Gogate in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  12. A New Proposed Model for the Influence of Climate Change on the Tension Anticipation in Hospital Emergencies

    Various threats of different nature have emerged over the past decades such as COVID-19, terrorism, industrial, and environmental disasters. They...
    Chapter 2024
  13. Intrusion Detection Systems Using Machine Learning

    Intrusion detection systems (IDS) have developed and evolved over time to form an important component in network security. The aim of an intrusion...
    William Taylor, Amir Hussain, ... Jawad Ahmad in Decision Making and Security Risk Management for IoT Environments
    Chapter 2024
  14. Considerations and Challenges

    As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before...
    Chapter 2024
  15. Introduction

    This chapter introduces the research topic of face de-identification covered in this book. First, it describes the background that motivates the need...
    Chapter 2024
  16. Differential Private Identification Protection for Face Images

    In this chapter, we focus on providing theory guarantee to improve fundamental face de-identification. We propose IdentityDP, a face anonymization...
    Chapter 2024
  17. Challenges of Usable Privacy

    A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  18. Introduction to Usable Privacy

    This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  19. Overview of Usable Privacy Research: Major Themes and Research Directions

    A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy...
    Simone Fischer-Hübner, Farzaneh Karegar in The Curious Case of Usable Privacy
    Chapter 2024
  20. Detecting Web Application DAST Attacks in Large-Scale Event Data

    This chapter proposes data-centric machine learning to protect web applications from dynamic application security testing (DAST) attacks. DAST...
    Pojan Shahrivar, Stuart Millar in Artificial Intelligence for Security
    Chapter 2024
Did you find what you were looking for? Share feedback.