Series in Security, Privacy and Trust
About the Book Series
If you are interested in submitting a proposal for a book to be published in this series, please email [email protected]
Touchless Fingerprint Biometrics
1st Edition
By Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti
January 31, 2024
Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced ...
Botnets: Architectures, Countermeasures, and Challenges
1st Edition
Edited
By Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
August 29, 2022
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters ...
Protecting Mobile Networks and Devices: Challenges and Solutions
1st Edition
Edited
By Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
September 30, 2020
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking ...
Real-World Electronic Voting: Design, Analysis and Deployment
1st Edition
Edited
By Feng Hao, Peter Y. A. Ryan
September 30, 2020
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.This book explores ...
Empirical Research for Software Security: Foundations and Experience
1st Edition
Edited
By Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
June 30, 2020
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that ...
Intrusion Detection and Prevention for Mobile Ecosystems
1st Edition
Edited
By Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
June 30, 2020
This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection ...
Location Privacy in Wireless Sensor Networks
1st Edition
By Ruben Rios, Javier Lopez, Jorge Cuellar
June 30, 2020
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor ...






