Search
Search Results
-
Information Experience and Information Literacy 8th European Conference on Information Literacy, ECIL 2023, Kraków, Poland, October 9–12, 2023, Revised Selected Papers, Part I
The two-volume set CCIS 2042 and 2043 constitutes the refereed proceedings of the 8th European Conference on Information Literacy, ECIL 2023, held in... -
Information Security Planning A Practical Approach
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the...
-
Cognitive Computing – ICCC 2023 7th International Conference Held as Part of the Services Conference Federation, SCF 2023 Shenzhen, China, December 17-18, 2023 Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during...
-
Decision Making and Security Risk Management for IoT Environments
This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The... -
Blockchains A Handbook on Fundamentals, Platforms and Applications
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The... -
Introduction to Cybersecurity A Multidisciplinary Challenge
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted...
-
Cyber Crisis Management Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
Cyber-Attacken und IT-Pannen bedrohen jede Organisation. Die Zwischenfälle häufen sich und bilden oft den Auftakt zu komplexen, existenzgefährdenden... -
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on...
-
IoMT Applications Perspectives: From Opportunities and Security Challenges to Cyber-Risk Management
The Internet of Things (IoT) paradigm is gaining popularity since it promotes the development of several smart and innovative applications.... -
Implementation of the C4.5 Algorithm in the Internet of Things Applications
The Internet of Things changes how people perform their daily activities. With data mining techniques, the Internet of Things assists users to... -
Multivariate Procedure for Modeling and Prediction of Temperature in Punjab, Pakistan
Climate study often relies upon global climate models (GCM) to project future scenarios of change in climate behavior. This study aims to refine GCM... -
A New Proposed Model for the Influence of Climate Change on the Tension Anticipation in Hospital Emergencies
Various threats of different nature have emerged over the past decades such as COVID-19, terrorism, industrial, and environmental disasters. They... -
Intrusion Detection Systems Using Machine Learning
Intrusion detection systems (IDS) have developed and evolved over time to form an important component in network security. The aim of an intrusion... -
Considerations and Challenges
As with any new technology, continuous biometric authentication systems have a variety of considerations and challenges that must be addressed before... -
Introduction
This chapter introduces the research topic of face de-identification covered in this book. First, it describes the background that motivates the need... -
Differential Private Identification Protection for Face Images
In this chapter, we focus on providing theory guarantee to improve fundamental face de-identification. We propose IdentityDP, a face anonymization... -
Challenges of Usable Privacy
A thorough understanding of usable privacy research challenges is essential for ensuring high-quality research, improving methods and avoiding... -
Introduction to Usable Privacy
This introductory chapter first discusses the significance of privacy and informational self-determination as a basic human right for individuals and... -
Overview of Usable Privacy Research: Major Themes and Research Directions
A wide variety of literature exists on privacy across different communities and disciplines, including Human-Computer Interaction (HCI). Privacy... -
Detecting Web Application DAST Attacks in Large-Scale Event Data
This chapter proposes data-centric machine learning to protect web applications from dynamic application security testing (DAST) attacks. DAST...