This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infr…
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer…
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6,…
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at SOCO 2013, CISIS 2013 and ICEUTE 2013, all conferences held in the beautiful and historic city of Sal…
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volum…
Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to…