Data Privacy and Security - Principles and Applications offers a comprehensive look at the critical aspects of protecting data in today’s interconnected world. As digital innovations rapidly expand across sectors such as healthcare, finance,…
Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research…
This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end…
The journal Axioms has achieved a remarkable increase in the number of papers published, as well as a significant growth in citations over the past decade. In order to mark this significant milestone, I am glad to lead this Special Issue entitled…
Digital technologies offer unprecedented opportunities for organizations to realize efficiency gains and explore new lines of business. However, their integration into existing corporate structures and routines hardly materializes without frictions…
This This book is open access under a CC BY 4.0 license. This book offers a comprehensive guide, covering every important aspect of computational thinking education. It provides an in-depth discussion of computational thinking, including the notion…
"This book lays out much of what we’ve learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn’t to predict the future but to…
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?
Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements are not revealing pre-determined values,…
In diesem Open-Access-Tagungsband sind die besten Beiträge des 8. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2022) enthalten. Das Kolloquium fand am 02. November 2022 auf dem Innovation Campus Lemgo statt. Die vorgestellten neuesten…