0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Paperback, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Paperback, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,739 Discovery Miles 47 390 Ships in 10 - 15 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,772 Discovery Miles 47 720 Ships in 10 - 15 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings... Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).

Data Hiding and Its Applications - Digital Watermarking and Steganography (Hardcover): David Meg?as, Wojciech Mazurczyk, Minoru... Data Hiding and Its Applications - Digital Watermarking and Steganography (Hardcover)
David Megıas, Wojciech Mazurczyk, Minoru Kuribayashi
R1,656 R1,367 Discovery Miles 13 670 Save R289 (17%) Ships in 10 - 15 working days
Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications: Ahmed A. Abd El-Latif, Mohamed Hammad,... Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications
Ahmed A. Abd El-Latif, Mohamed Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
R3,518 R3,031 Discovery Miles 30 310 Save R487 (14%) Ships in 10 - 15 working days

The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks. This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity. Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.

Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,099 Discovery Miles 10 990 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,085 Discovery Miles 10 850 Ships in 10 - 15 working days
Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover): El-Sayed M El-Alfy,... Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover)
El-Sayed M El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk
R4,154 R3,573 Discovery Miles 35 730 Save R581 (14%) Ships in 10 - 15 working days

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; nature-inspired cryptography and cryptanalysis, and more.

Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,090 Discovery Miles 10 900 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bantex @School Two Hole Sharpener with…
R8 Discovery Miles 80
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bostik Easy Tear Tape (12mm x 33m)
R14 Discovery Miles 140
Womens 2-Piece Fitness Gym Gloves (Pink)
R129 Discovery Miles 1 290
Snappy Tritan Bottle (1.2L)(Blue)
 (2)
R239 R169 Discovery Miles 1 690
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners