This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Industry 4.0 has greatly enhanced the intricacy and interconnectedness of industrial operations. Industrial Internet of Things (IIoT) systems allow for smooth communication and collaboration among machines, devices, and sensors, leaves IIoT networ...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
A comprehensive guide to automotive offensive security breaking down real-world exploitation starting from the vehicle backend, through high-performance ECUs down to the edge sensors to bridge the gap between defensive engineering and offensive secu...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...
Secure your critical infrastructure by understanding architectures and risks, hardening legacy and modern systems, protecting data and communications, and building resilient policies through real-world case studies Key Features ...Loe edasi...
In a world increasingly shaped by technology, digital sovereignty is a critical need for nations and organizations to preserve their autonomy. It is more than just control over data and infrastructure; its about safeguarding values, privacy, and...Loe edasi...
This book critiques legal frameworks involving the bulk processing of personal data to predict and prevent crime through advanced profiling technologies. It questions their legitimacy and impact in light of the EUs powers to provide security while s...Loe edasi...
This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods....Loe edasi...
Legacies of the Surveillance State offers a chilling exploration of two historical surveillance societies: East Germany and Northern Ireland during the 1970s and 1980s to provide a unique perspective on the human cost of surveillance....Loe edasi...
Offering a holistic view of the pioneering trends and innovations in Smart Healthcare Management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intellige...Loe edasi...
This book discusses the direct confluence of EdgeAI with big data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasure. It provides computational intelligence techniques and automated reasoning models capable o...Loe edasi...
As providing online consent has become increasingly difficult, some have argued that surveillance capitalism needs to be overthrown. This book presents a different perspective. It departs from the concept of revolutionary change to focus on pragmati...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
This book explores the need for a data-centric AI approach and its application in the multidisciplinary domain, compared to a model-centric approach....Loe edasi...
Technology Innovation Pillars for Industry 4.0: Challenges, Improvements, and Case Studies discusses the latest innovations in the application of technologies to Industry 4.0 and the nine pillars and how they relate, support, and bridge the gap betw...Loe edasi...