PICK&READ
Bonjour !
Connectez-vous pour afficher vos livres, identifier ceux en cours de lecture ou déjà lus
Pas encore de compte ?
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design...
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress....
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’...
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book.The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation...
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.This book is organized into five parts with a total of 15 chapters. Each area corresponds to an...
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world...
This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book...
?This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is...
En poursuivant votre navigation, vous acceptez l'utilisation de cookies qui permettront notamment de vous offrir contenus, services, et publicités liés à vos centres d'intérêt.