You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.
This book constitutes the thoroughly refereed proceedings of the 30th Annual German Conference on Artificial Intelligence, KI 2007, held in Osnabrück, Germany, September 2007. The papers are organized in topical sections on cognition and emotion, semantic Web, analogy, natural language, reasoning, ontologies, spatio-temporal reasoning, machine learning, spatial reasoning, robot learning, classical AI problems, and agents.
One of the grand challenges in our digital world are the large, complex and often weakly structured data sets, and massive amounts of unstructured information. This “big data” challenge is most evident in biomedical informatics: the trend towards precision medicine has resulted in an explosion in the amount of generated biomedical data sets. Despite the fact that human experts are very good at pattern recognition in dimensions of = 3; most of the data is high-dimensional, which makes manual analysis often impossible and neither the medical doctor nor the biomedical researcher can memorize all these facts. A synergistic combination of methodologies and approaches of two fields offer ideal...
The fields of Artificial Intelligence (AI) and Machine Learning (ML) have grown dramatically in recent years, with an increasingly impressive spectrum of successful applications. This book represents a key reference for anybody interested in the intersection between mathematics and AI/ML and provides an overview of the current research streams. Engineering Mathematics and Artificial Intelligence: Foundations, Methods, and Applications discusses the theory behind ML and shows how mathematics can be used in AI. The book illustrates how to improve existing algorithms by using advanced mathematics and offers cutting-edge AI technologies. The book goes on to discuss how ML can support mathematical modeling and how to simulate data by using artificial neural networks. Future integration between ML and complex mathematical techniques is also highlighted within the book. This book is written for researchers, practitioners, engineers, and AI consultants.
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security a...
An exploration of how email is experienced, understood, and materially structured as a practice spanning our everyday domestic and work lives. Despite its many obituaries, email is not dead. As a global mode of business and personal communication, email outstrips newer technologies of online interaction; it is deeply embedded in our everyday lives. And yet—perhaps because the ubiquity of email has obscured its study—this is the first scholarly book devoted to email as a key historical, social, and commercial site of digital communication in our everyday lives. In Email and the Everyday, Esther Milne examines how email is experienced, understood, and materially structured as a practice sp...
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research o...
Today, Internet of Things (IoT) is ubiquitous as it is applied in practice in everything from Industrial Control Systems (ICS) to e-Health, e-commerce, Cyber Physical Systems (CPS), smart cities, smart parking, healthcare, supply chain management and many more. Numerous industries, academics, alliances and standardization organizations make an effort on IoT standardization, innovation and development. But there is still a need for a comprehensive framework with integrated standards under one IoT vision. Furthermore, the existing IoT systems are vulnerable to huge range of malicious attacks owing to the massive numbers of deployed IoT systems, inadequate data security standards and the resour...
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperat...
IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.