With the increasing demand of robots for industrial or domestic use, it becomes indispensable to ensure their safety, security and reliability. This book therefore provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts.
With the increasing demand of robots for industrial or domestic use, it becomes indispensable to ensure their safety, security and reliability. This ...
This book emphasizes the idea of understanding the motivation of the advanced circuits’ design to establish the AI interface and to mitigate the security attacks in a better way for big data. It is for students, researchers, and professionals, faculty members and software developers who wish to carry out further research.
This book emphasizes the idea of understanding the motivation of the advanced circuits’ design to establish the AI interface and to mitigate the sec...
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.
This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographi...
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contrib...
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples...
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring differe...