0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Paperback, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Paperback, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,739 Discovery Miles 47 390 Ships in 10 - 15 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,772 Discovery Miles 47 720 Ships in 10 - 15 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings... Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings (Paperback, 1st ed. 2017)
Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).

Data Hiding and Its Applications - Digital Watermarking and Steganography (Hardcover): David Meg?as, Wojciech Mazurczyk, Minoru... Data Hiding and Its Applications - Digital Watermarking and Steganography (Hardcover)
David Megıas, Wojciech Mazurczyk, Minoru Kuribayashi
R1,656 R1,367 Discovery Miles 13 670 Save R289 (17%) Ships in 10 - 15 working days
Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications: Ahmed A. Abd El-Latif, Mohamed Hammad,... Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications
Ahmed A. Abd El-Latif, Mohamed Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
R3,518 R3,031 Discovery Miles 30 310 Save R487 (14%) Ships in 10 - 15 working days

The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks. This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity. Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.

Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,099 Discovery Miles 10 990 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,085 Discovery Miles 10 850 Ships in 10 - 15 working days
Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover): El-Sayed M El-Alfy,... Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover)
El-Sayed M El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk
R4,154 R3,573 Discovery Miles 35 730 Save R581 (14%) Ships in 10 - 15 working days

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; nature-inspired cryptography and cryptanalysis, and more.

Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,090 Discovery Miles 10 900 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Olga Kirsch - A Life In Poetry
Egonne Roth Paperback R275 R215 Discovery Miles 2 150
Love - Poems To Bolster Every Heart That…
Donna Ashworth Hardcover R250 R195 Discovery Miles 1 950
Herontdek Jou Selfvertroue - Sewe Stappe…
Rolene Strauss Paperback  (1)
R330 R284 Discovery Miles 2 840
Modern Cape Malay Cooking - Comfort Food…
Cariema Isaacs Paperback R370 R260 Discovery Miles 2 600
Madam & Eve: Family Meeting
Stephen Francis Paperback R220 R172 Discovery Miles 1 720
Bait - To Catch A Killer
Janine Lazarus Paperback R320 R275 Discovery Miles 2 750
Chris van Wyk: Irascible Genius - A…
Kevin van Wyk Paperback R360 R255 Discovery Miles 2 550
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R375 Discovery Miles 3 750
Birding In South Africa's National Parks
Rob Little Paperback R225 R176 Discovery Miles 1 760
Power In Action - Democracy, Citizenship…
Steven Friedman Paperback R350 R273 Discovery Miles 2 730

 

Partners