1
Information Security Planning [E-Book] : A Practical Approach /
2
Cloud to edgeware [E-Book] : wireless grid applications, architecture and security for the Internet of Things /
Table of Contents: ... technology -- Edge computing and cyber warfare: strategies for future operations in a wireless grid SDN-enabled world -- Developing a cyberassurance multiple adversary risk model for wireless grids edgeware -- An internet control device embedded sensor agent...

Full text 
3
Cybersecurity Teaching in Higher Education [E-Book] /
Table of Contents: ...Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master's Program in Information Security Management -- Chapter. 3...

Full text 
4
Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants [E-Book] /
5
Information Systems [E-Book] : 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8-9, 2021, Proceedings /
Table of Contents: ... Technology and Applications -- Computation of Blockchain Readiness Under Partial Information -- Blockchain Application in Luxury Brand Strategy: What Does Blockchain Technology Mean to Luxury Brands? -- Exploring the Need for Blockchain-based National Population...

Full text 
6
Smart Systems for E-Health [E-Book] : WBAN Technologies, Security and Applications /
Table of Contents: ...Introduction -- Part I: Physical Design of Medical Devices, Signal Processing and Emergent Wireless Technologies for E-health -- Design and Control of Multifunctional, Multiarticulate Prosthetic Hand -- A Mobile Computing Solution for Enhanced Living...

Full text 
7
Advanced Information Systems Engineering Workshops [E-Book] : CAiSE 2021 International Workshops, Melbourne, VIC, Australia, June 28 - July 2, 2021, Proceedings /
8
Smart Log Data Analytics [E-Book] : Techniques for Advanced Security Analysis /
Table of Contents: ... -- 8.3.4 Compute indicators -- 8.3.5 Select tokens -- 8.3.6 Compute indicator weights -- 8.3.7 Report anomalies -- 8.4 Try it out -- 8.4.1 Apache Access log -- 9. Final remarks....

Full text 
9
Privacy-Preserving Deep Learning [E-Book] : A Comprehensive Survey /
10
Privacy-Preserving in Edge Computing [E-Book] /
Table of Contents: ...Chapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based...

Full text 
11
Quantum Cryptography [E-Book] : From Key Distribution to Conference Key Agreement /
12
Service-Oriented Computing  - ICSOC 2020 Workshops [E-Book] : AIOps, CFTIC, STRAPS, AI-PA, AI-IOTS, and Satellite Events, Dubai, United Arab Emirates, December 14-17, 2020, Proceedings /
Table of Contents: ... of operational faults in cloud applications by mining causal dependencies in logs using Golden Signals -- Pre-training Language Models for IT Operations -- Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures -- Decentralized...

Full text 
13
Artificial Intelligence in Cyber Security: Impact and Implications [E-Book] : Security Challenges, Technical and Ethical Issues, Forensic Investigative Challenges /
Table of Contents: ..., Profiling and Modelling and Privacy by Design -- 8. Artificial Intelligence-Enabled Authentication and Associated Security Implications -- 9. Attacking Artificial Intelligence: Security Vulnerability and Proposed Countermeasures -- 10. Intelligent Security...

Full text 
14
Digital Forensic Investigation of Internet of Things (IoT) Devices [E-Book] /
15
Malware Analysis Using Artificial Intelligence and Deep Learning [E-Book] /
16
Fog/Edge Computing For Security, Privacy, and Applications [E-Book] /
Chang, Wei
2021
Table of Contents: ... for Fog/Edge Computing Resources" -- 10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing" -- 11. "Blockchain-based Security Services for Fog Computing". Part V: Applications of Fog/Edge Computing -- 12. "Industrial Internet of Things (IIoT...

Full text 
17
The CISO's Transformation : Security Leadership in a High Threat Landscape [E-Book] /
Table of Contents: ... -- Protect society, the commonwealth, and the infrastructure - post COVID-19 -- Self-Service Recovery Options for Bricked Windows Devices -- Certification and Accreditation -- Hack back or not -- CISOs need Liability Protection -- Enable Secure work-from-home....

Full text 
18
Selected Areas in Cryptography [E-Book] : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers /
Table of Contents: ...Public-key Cryptography -- Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments -- FROST: Flexible Round-Optimized Schnorr Threshold Signatures -- Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled...

Full text 
19
The CISO's Next Frontier : AI, Post-Quantum Cryptography and Advanced Security Paradigms [E-Book] /
Table of Contents: ...Are you ready for Quantum computing? -- The need for post-quantum cryptography -- Quantum Encryption is not a Paradox -- AI Code of Ethics for Cybersecurity -- The Case of AI/ML in Cybersecurity -- Security for Work-From-Home Technologies -- Secure video...

Full text 
20
Public-Key Cryptography - PKC 2021 [E-Book] : 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II /
Table of Contents: ... for Non-Interactive Statistical Zero-Knowledge -- On the CCA Compatibility of Public-Key Infrastructure -- Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices -- BETA: Biometric-Enabled Threshold Authentication -- Masked Triples...

Full text