Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Ccset 2023), Riyadh, Saudi Arabia, 5th-7th December, 2023
Herausgeber: Abd El-Latif, Ahmed A; Maleh, Yassine; Alshara, Mohamed Ali; Elaffendi, Mohammed A
Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Proceedings of the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Ccset 2023), Riyadh, Saudi Arabia, 5th-7th December, 2023
Herausgeber: Abd El-Latif, Ahmed A; Maleh, Yassine; Alshara, Mohamed Ali; Elaffendi, Mohammed A
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing our digital world.
Andere Kunden interessierten sich auch für
- Advances in Mobile Cloud Computing Systems180,99 €
- Smart Ships125,99 €
- Machine-To-Machine Communications163,99 €
- Seng LokeContext-Aware Pervasive Systems120,99 €
- Honbo ZhouThe Internet of Things in the Cloud135,99 €
- Media Networks164,99 €
- Jithesh SathyanFundamentals of Ems, Nms and Oss/BSS124,99 €
-
-
-
This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing our digital world.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 386
- Erscheinungstermin: 11. Juli 2025
- Englisch
- ISBN-13: 9781041013259
- ISBN-10: 1041013256
- Artikelnr.: 73732366
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 386
- Erscheinungstermin: 11. Juli 2025
- Englisch
- ISBN-13: 9781041013259
- ISBN-10: 1041013256
- Artikelnr.: 73732366
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Abd El-Latif, a distinguished full Professor of computer science at Menoufia University, Egypt, has expertise which encompasses quantum cryptography, cybersecurity, chaotic dynamical systems, and AI applications in 5G and 6G networks. A full-stack computer scientist engaged in coding, development, research, and theoretical work, he founded the Center of Excellence in Quantum & Intelligent Computing and has received several prestigious awards, including the State Encouragement Award in Engineering Sciences (Egypt, 2016), Best Ph.D. Student Award (China, 2013), and the Young Scientist Award (Menoufia University, 2014). A prolific author with over 320 publications, including more than 30 IEEE Transactions papers and 20 books, his work has garnered over 14,000 citations and an H-index of 64. He leads the MEGANET 6G Lab research in Russia and has consistently been recognized among the top 2% of scientists in his field by the Stanford List of Top Scientists (2019-2024). Dr. Abd El-Latif actively contributes to the scientific community as Chair/Co-Chair of numerous Scopus/EI conferences and holds key editorial positions with reputed journals. Mohammed A. El-Affendi is currently a Professor with the Department of Computer Science, Prince Sultan University. He has formerly served as the Dean of CCIS, AIDE, the Rector, Founder, and Director of EIAS Data Science Laboratory, and the Founder and Director of the Center of Excellence in Cyber Security. His current research interests include data science, intelligent and cognitive systems, machine learning, and natural language processing. Mohammed Ali Alshara received a B.Sc. degree from Imam Mohammad Ibn Saud Islamic University, in 2002, and his M.Sc. and Ph.D. degrees from the University of Texas, in 2008 and 2016, respectively. He is currently the Dean at College of Computer and Information Sciences (CCIS), Prince Sultan University (PSU), Riyadh, Saudi Arabia. His research interests include data and content analysis, knowledge management, and information retrieval. Yassine Maleh is an Associate Professor of cybersecurity and IT governance at Sultan Moulay Slimane University, Morocco, since 2019. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency (2012-2019). He is a senior member of IEEE and a member of the International Association of Engineers (IAENG) and The Machine Intelligence Research Labs. Dr Maleh's research interests include information security and privacy, internet of things, networks security, information system, and IT governance. He has published over 200 papers (book chapters, international journals, and conferences/workshops), 40 edited books, and 8 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy (IJISP, IF: 0.8), and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for many reputed journals.
1. Artificial Intelligence and Machine Learning in Cybersecurity 2.
Blockchain and Distributed Ledger Technologies 3. Securing Critical
Infrastructure and IoT 4. Data Privacy and Governance 5. Malware Analysis
and Detection 6. Cloud Security and Optimization 7. Network Security and
Intrusion Detection 8. Security of Autonomous Systems 9. Cryptography and
Data Protection 10. Cybersecurity Frameworks and Standards 11. The Future
of Cybersecurity
Blockchain and Distributed Ledger Technologies 3. Securing Critical
Infrastructure and IoT 4. Data Privacy and Governance 5. Malware Analysis
and Detection 6. Cloud Security and Optimization 7. Network Security and
Intrusion Detection 8. Security of Autonomous Systems 9. Cryptography and
Data Protection 10. Cybersecurity Frameworks and Standards 11. The Future
of Cybersecurity
1. Artificial Intelligence and Machine Learning in Cybersecurity 2.
Blockchain and Distributed Ledger Technologies 3. Securing Critical
Infrastructure and IoT 4. Data Privacy and Governance 5. Malware Analysis
and Detection 6. Cloud Security and Optimization 7. Network Security and
Intrusion Detection 8. Security of Autonomous Systems 9. Cryptography and
Data Protection 10. Cybersecurity Frameworks and Standards 11. The Future
of Cybersecurity
Blockchain and Distributed Ledger Technologies 3. Securing Critical
Infrastructure and IoT 4. Data Privacy and Governance 5. Malware Analysis
and Detection 6. Cloud Security and Optimization 7. Network Security and
Intrusion Detection 8. Security of Autonomous Systems 9. Cryptography and
Data Protection 10. Cybersecurity Frameworks and Standards 11. The Future
of Cybersecurity