Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021


Book Description

Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.




Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023


Book Description

This book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world’s attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary.




Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021


Book Description

Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.




Security, Privacy, and Applied Cryptography Engineering


Book Description

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.




Smart Manufacturing Technologies for Industry 4.0


Book Description

This book addresses issues related to the integration of digital evolutionary technologies and provides solutions to various challenges encountered during the implementation process. With real-time case studies, the book explains the smart technologies available and their operational applications and benefits in the manufacturing sector. Smart Manufacturing Technologies for Industry 4.0: Integration, Benefits, and Operational Activities assists in the understanding of the shifting paradigm in the manufacturing sector towards smart manufacturing and spotlights these technologies and the effects they are having on existing industries. It showcases Industry 4.0 as a promising research area in its infancy and offers insights into the role smart technologies are playing now and into the future. The book focuses on smart technologies’ rudiments, implementation, and integration for organizational development and offers insights on how to achieve resiliency through and because of these technologies. This book presents real-time implementation discussions along with case studies that emphasize benefits and operational activities for engineers and managers. It’s also a very useful book for technology developers, academicians, data scientists, industrial engineers, researchers, and students interested in uncovering the latest innovations in a field that seeks current research on products and services.




Exploring Cyber Criminals and Data Privacy Measures


Book Description

In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.




Cybersecurity for Smart Cities


Book Description

Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.




Reshaping Entrepreneurial Education Within an Industry 4.0 Context


Book Description

Higher education is constantly changing and advancing, and the integration of technology and its transformative potential remains elusive for many universities globally. While other industries have surged forward with digitization, higher education has been slow to completely embrace technology-driven outcomes. Reshaping Entrepreneurial Education Within an Industry 4.0 Context sheds light on the barriers preventing widespread technological adoption and the profound changes that Industry 4.0 brings to education. As the fourth industrial revolution, Industry 4.0, continues to unfold, this book delves into how this phenomenon is reshaping the field of education. This book presents a comprehensive analysis of how digital technology and capabilities are becoming integral to building more flexible and adaptive tertiary education systems in regions like Latin America and the Caribbean. It also highlights the challenges faced by online learning and the urgent need for a fundamental rethinking of higher education to ensure equal access to quality education. This publication addresses a diverse audience, making it an essential resource for students, academicians, and higher education administrators seeking an in-depth understanding of Reshaping Entrepreneurial Education Within an Industry 4.0 Context. For practitioners, it provides valuable insights to enrich their work in the realm of higher education. The book covers a broad spectrum of key themes, including the impact of the 4th industrial revolution on entrepreneurial education, the transformative power of online learning in global universities, and the hurdles faced in adopting digital education. Additionally, the experts behind this research delve into how information and communication technologies (ICTs) are influencing educational policies and teaching methods worldwide, as well as the role of metaverse technologies in designing curricula for entrepreneurial education.




Cybersecurity, Privacy and Freedom Protection in the Connected World


Book Description

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.




Progress in Image Processing, Pattern Recognition and Communication Systems


Book Description

This book presents a collection of high-quality research papers accepted to multi-conference consisting of International Conference on Image Processing and Communications (IP&C 2021), International Conference on Computer Recognition Systems (CORES 2021), International Conference on Advanced Computer Systems (ACS 2021) held jointly in Bydgoszcz, Poland (virtually), in June 2021. The accepted papers address current computer science and computer systems-related technological challenges and solutions, as well as many practical applications and results. The first part of the book deals with advances in pattern recognition and classifiers, the second part is devoted to image processing and computer vision, while the third part addresses practical applications of computer recognition systems. Machine learning solutions for security and networks are tackled in part four of the book, while the last part collects papers on progress in advanced computer systems. We believe this book will be interesting for researchers and practitioners in many fields of computer science and IT applications.