You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece in June 2014. The 41 papers and 3 keynotes presented were carefully reviewed and selected from 226 submissions. The accepted papers were presented in 13 sessions: clouds and services; requirements; product lines; requirements elicitation; processes; risk and security; process models; data mining and streaming; process mining; models; mining event logs; databases; software engineering.
The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, n...
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the revised selected papers of the workshops of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, in December 2013. The conference hosted the following five workshops: 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13); 1st International Workshop on Cloud Service Brokerage (CSB'13); 1st International Workshop on Pervasive Analytical Service Clouds for the Enterprise and Beyond (PASCEB'13); 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE'13); 9th International Workshop on Engineering Service-Oriented Applications (WESOA'13); and a PhD Symposium, with best papers also being included in this book. The 54 papers included in this volume were carefully reviewed and selected from numerous submissions. They address various topics in the service-oriented computing domain and its emerging applications.
Applications of Blockchain in Cybersecurity Solutions is a comprehensive guide to blockchain applications in computer security. it presents the concepts and practical techniques that are useful in creating and designing decentralized cybersecurity software through 9 carefully edited chapters. Topics covered in the book include - An introduction to the use of blockchain technology in cybersecurity - Attack surfaces in blockchains - Anti-counterfeit solutions in blockchains - blockchain based access control systems - Multi-chain security deployment over smart contracts - Cybersecurity as a decentralized service The book is an essential primer for computer science students and researchers, and a quick reference for IT professionals on blockchain based cybersecurity.
This edited book is a compilation of scholarly articles on the latest developments in the field of AI, Blockchain, and ML/DL in cloud security. This book is designed for security and risk assessment professionals, and to help undergraduate, postgraduate students, research scholars, academicians, and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security conc...
Smart Grids as Cyber Physical Systems, a new two-volume set from Wiley-Scrivener, provides a comprehensive overview of the fundamental security of supervisory control and data acquisition (SCADA) systems, offering clarity on specific operating and security issues that may arise that deteriorate the overall operation and efficiency of smart grid systems. It also provides techniques to monitor and protect systems, as well as aids for designing a threat-free system. This title discusses how artificial intelligence (AI) may be extensively deployed in the prediction of energy generation, electric grid-related line loss prediction, load forecasting, and for predicting equipment failure prevention....