- Table View
- List View
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14651)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14652)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14653)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14654)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V (Lecture Notes in Computer Science #14655)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI (Lecture Notes in Computer Science #14656)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII (Lecture Notes in Computer Science #14657)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4–8, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15601)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15602)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15603)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part IV (Lecture Notes in Computer Science #15604)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part V (Lecture Notes in Computer Science #15605)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Lecture Notes in Computer Science #15606)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VII (Lecture Notes in Computer Science #15607)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VIII (Lecture Notes in Computer Science #15608)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cultural Tourism Research: Proceedings of the International Conference on Cultural Tourism Advances, June 2023, Belgium (Advances in Digital and Cultural Tourism Management)
by Marinos Ioannides João Martins Bart NeutsThis open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by examining successful policy interventions, emerging cultural tourism trends, advancements in visitor management systems, new business and governance models, and the opportunities arising from ICT in the twenty-first century. This book presents recent key advances and their significant outcomes in the domain of European Cultural Tourism.
Advances in Culturally-Aware Intelligent Systems and in Cross-Cultural Psychological Studies (Intelligent Systems Reference Library #134)
by Colette FaucherThis book offers valuable new insights into the design of culturally-aware systems. In its first part, it is devoted to presenting selected Culturally-Aware Intelligent Systems devised in the field of Artificial Intelligence and its second part consists of two sub-parts that offer a source of inspiration for building modelizations of Culture and of its influence on the human mind and behavior, to be used in new Culturally-Aware Intelligent Systems. Those sub-parts present the results of experiments conducted in two fields that study Culture and its influence on the human mind's functions: Cultural Neuroscience and Cross-Cultural Psychology. In this era of globalization, people from different countries and cultures have the opportunity to interact directly or indirectly in a wide variety of contexts. Despite differences in their ways of thinking and reasoning, their behaviors, their values, lifestyles, customs and habits, languages, religions - in a word, their cultures - they must be able to collaborate on projects, to understand each other's views, to communicate in such a way that they don't offend each other, to anticipate the effects of their actions on others, and so on. As such, it is of primary importance to understand how culture affects people's mental activities, such as perception, interpretation, reasoning, emotion and behavior, in order to anticipate possible misunderstandings due to differences in handling the same situation, and to try and resolve them. Artificial Intelligence, and more specifically, the field of Intelligent Systems design, aims at building systems that mimic the behavior of human beings in order to complete tasks more efficiently than humans could by themselves. Consequently, in the last decade, experts and scholars in the field of Intelligent Systems have been increasingly tackling the notion of cultural awareness. A Culturally-Aware Intelligent System can be defined as a system where Culture-related or, more generally, socio-cultural information is modeled and used to design the human-machine interface, or to provide support with the task carried out by the system, be it reasoning, simulation or any other task involving cultural knowledge.
Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)
by Atulya K. Nagar Shishir K. Shandilya Neal WagnerThis book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Advances in Cyber Security and Intelligent Analytics
by Jitendra Kumar Valentina Emilia Balas Abhishek Verma Vrijendra Singh Hari Mohan GaurWe live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models—IoT, SDN, and ICN—to support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers (Communications in Computer and Information Science #1132)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the First International Conference on Advances in Cyber Security, ACeS 2019, held in Penang, Malaysia, in July-August 2019.The 25 full papers and 1 short paper were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on internet of things, industry and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and DDoS and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication.
Advances in Cyber Security: Principles, Techniques, and Applications
by Kuan-Ching Li Xiaofeng Chen Willy SusiloThis book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers (Communications in Computer and Information Science #1347)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
Advances in Cyber Security: Technology, Operations, and Experiences
by D. Frank Hsu Dorothy MarinucciAs you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.The world’s foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; toFBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation.The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security—including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks.Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public–private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyberecosystem.
Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers (Communications in Computer and Information Science #1487)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (Lecture Notes in Electrical Engineering #643)
by Amit Kumar Vinit Kumar Gunjan Xiao-Zhi Gao Sabrina Senatore Suresh MeruguThis book highlights recent advances in Cybernetics, Machine Learning and Cognitive Science applied to Communications Engineering and Technologies, and presents high-quality research conducted by experts in this area. It provides a valuable reference guide for students, researchers and industry practitioners who want to keep abreast of the latest developments in this dynamic, exciting and interesting research field of communication engineering, driven by next-generation IT-enabled techniques. The book will also benefit practitioners whose work involves the development of communication systems using advanced cybernetics, data processing, swarm intelligence and cyber-physical systems; applied mathematicians; and developers of embedded and real-time systems. Moreover, it shares insights into applying concepts from Machine Learning, Cognitive Science, Cybernetics and other areas of artificial intelligence to wireless and mobile systems, control systems and biomedical engineering.