View All Book Series

Series in Security, Privacy and Trust

About the Book Series

If you are interested in submitting a proposal for a book to be published in this series, please email [email protected]

7 Series Titles


Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

1st Edition

By Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti
January 31, 2024

Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced ...

Botnets Architectures, Countermeasures, and Challenges

Botnets: Architectures, Countermeasures, and Challenges

1st Edition

Edited By Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
August 29, 2022

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters ...

Protecting Mobile Networks and Devices Challenges and Solutions

Protecting Mobile Networks and Devices: Challenges and Solutions

1st Edition

Edited By Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
September 30, 2020

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking ...

Real-World Electronic Voting Design, Analysis and Deployment

Real-World Electronic Voting: Design, Analysis and Deployment

1st Edition

Edited By Feng Hao, Peter Y. A. Ryan
September 30, 2020

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.This book explores ...

Empirical Research for Software Security Foundations and Experience

Empirical Research for Software Security: Foundations and Experience

1st Edition

Edited By Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
June 30, 2020

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that ...

Intrusion Detection and Prevention for Mobile Ecosystems

Intrusion Detection and Prevention for Mobile Ecosystems

1st Edition

Edited By Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
June 30, 2020

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection ...

Location Privacy in Wireless Sensor Networks

Location Privacy in Wireless Sensor Networks

1st Edition

By Ruben Rios, Javier Lopez, Jorge Cuellar
June 30, 2020

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor ...

AJAX loader