SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
1 Onwubiko, Cyril Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media I12867 2023 eBook  
2 Jahankhani, Hamid Wireless Networks I12814 2023 eBook  
3 Masys, Anthony J Handbook of Security Science I12218 2022 Book  
4 Visvizi, Anna Artificial Intelligence and Its Contexts I11916 2021 eBook  
(page:1 / 1) [#4]     

1.    
No image available
TitleProceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2022; 20???21 June; Wales
Author(s)Onwubiko, Cyril;Rosati, Pierangelo;Rege, Aunshul;Erola, Arnau;Bellekens, Xavier;Hindy, Hanan;Jaatun, Martin Gilje
PublicationSingapore, 1. Imprint: Springer 2. Springer Nature Singapore, 2023.
DescriptionXXVI, 476 p. 113 illus., 97 illus. in color : online resource
Abstract NoteThis book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters ???Municipal Cybersecurity???A Neglected Research Area? A Survey of Current Research", "The Transnational Dimensionof Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes??? are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
ISBN,Price9789811964145
Keyword(s)1. ARTIFICIAL INTELLIGENCE 2. Blockchain 3. Blockchains (Databases) 4. COMPLEX SYSTEMS 5. Computer crimes 6. Cooperating objects (Computer systems) 7. Cyber-Physical Systems 8. Cybercrime 9. EBOOK - SPRINGER 10. Security Science and Technology 11. Security systems 12. SYSTEM THEORY
Item TypeeBook
Multi-Media Links
media link description
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12867     On Shelf    

2.     
No image available
TitleWireless Networks : Cyber Security Threats and Countermeasures
Author(s)Jahankhani, Hamid;El Hajjar, Ayman
PublicationCham, 1. Imprint: Springer 2. Springer International Publishing, 2023.
DescriptionVI, 348 p. 161 illus., 129 illus. in color : online resource
Abstract NoteIn recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master???s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills
ISBN,Price9783031336317
Keyword(s)1. Computer crimes 2. COMPUTER NETWORKS 3. Cybercrime 4. Data and Information Security 5. Data protection 6. EBOOK - SPRINGER 7. Mobile and Network Security 8. Mobile communication systems 9. Wireless and Mobile Communication 10. Wireless communication systems
Item TypeeBook
Multi-Media Links
media link description
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12814     On Shelf    

3.     
No image available
TitleHandbook of Security Science
Author(s)Masys, Anthony J
PublicationCham, 1. Imprint: Springer 2. Springer International Publishing, 2022.
Description97 illus., 58 illus. in color. eReference : online resource
Abstract NoteThis handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ???national security??? means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body of work, the Handbook of Security Science captures concepts, theories and security science applications, thereby providing a survey of current and emerging trends in security. Through an evidence-based approach, the collection of chapters in the book delivers insightful and comprehensive articulation of the problem and solution space associated with the complex security landscape. In so doing the Handbook of Security Science introduces scientific tools and methodologies to inform security management, risk and resilience decision support systems; insights supporting design of security solutions; approaches to threat, risk and vulnerability analysis; articulation of advanced cyber security solutions; and current developments with respect to integrated computational and analytical solutions that increase our understanding of security physical, social, economic, and technological interrelationships and problem space
ISBN,Price9783319918754
Keyword(s)1. Computer crimes 2. Crime Control and Security 3. Criminology 4. Cybercrime 5. EBOOK 6. EBOOK - SPRINGER 7. Environmental sciences???Social aspects 8. Environmental Social Sciences 9. International Security Studies 10. Military and Defence Studies 11. Politics and war 12. Security Science and Technology 13. Security systems 14. Security, International
Item TypeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12218     On Shelf    

4.    
No image available
TitleArtificial Intelligence and Its Contexts : Security, Business and Governance
Author(s)Visvizi, Anna;Bodziany, Marek
PublicationCham, Springer International Publishing, 2021.
DescriptionVIII, 240 p. 31 illus., 13 illus. in color : online resource
Abstract NoteThis book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today???s world. The book has been divided into three parts. Part one is devoted to the question of how AI will be used for security and defense purposes, including combat in war zones. Part two looks at the value added of AI and machine learning for decision-making in the fields of politics and business. Part three consists of case studies???covering the EU, the USA, Saudi Arabia, Portugal, and Poland???that discuss how AI is being used in the realms of politics, security and defense. The discussion in the book opens with the question of the nature of AI, as well as of ethics and the use of AI in combat. Subsequently, the argument covers issues as diverse as the militarization of AI, the use of AI in strategic studies and military strategy design. These topics are followed by an insight into AI and strategic communication (StratCom), including disinformation, as well as into AI and finance. The case-studies included in part 3 of the book offer a captivating overview of how AI is being employed to stimulate growth and development, to promote data- and evidence-driven policy-making, to enable efficient and inclusive digital transformation and other related issues. Written by academics and practitioners in an academically sound, yet approachable manner, this volume queries issues and topics that form the thrust of processes that transform world politics, economics and society. As such, this volume will serve as the primer for students, researchers, lectures and other professionals who seek to understand and engage with the variety of issues AI implicates
ISBN,Price9783030889722
Keyword(s)1. ARTIFICIAL INTELLIGENCE 2. Computer crimes 3. Cybercrime 4. EBOOK 5. EBOOK - SPRINGER 6. Security Science and Technology 7. Security systems
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I11916     On Shelf    

(page:1 / 1) [#4]