You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This open access book constitutes revised selected papers from the International Workshops held at the Third International Conference on Process Mining, ICPM 2021, which took place in Eindhoven, The Netherlands, during October 31–November 4, 2021. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-located workshops provided a forum for novel research ideas. The 28 papers included in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: 2nd International Workshop on Event Data and Behavioral Analytics (EDBA) 2nd International Workshop on Leveraging Machine Learning in Process Mining (ML4PM) 2nd International Workshop on Streaming Analytics for Process Mining (SA4PM) 6th International Workshop on Process Querying, Manipulation, and Intelligence (PQMI) 4th International Workshop on Process-Oriented Data Science for Healthcare (PODS4H) 2nd International Workshop on Trust, Privacy, and Security in Process Analytics (TPSA) One survey paper on the results of the XES 2.0 Workshop is included.
This open access book constitutes revised selected papers from the International Workshops held at the 4th International Conference on Process Mining, ICPM 2022, which took place in Bozen-Bolzano, Italy, during October 23–28, 2022. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-located workshops provided a forum for novel research ideas. The 42 papers included in this volume were carefully reviewed and selected from 89 submissions. They stem from the following workshops: – 3rd International Workshop on Event Data and Behavioral Analytics (EDBA) – 3rd International Workshop on Leveraging Mach...
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity ...
Like many other fields, the area of manufacturing has advanced massively since the onset of the technological revolution brought about by advances in computing and smart technologies, and with the accelerating globalisation of manufacturing in the 21st century, the urgent need to keep pace has produced further rapid advancements in technology, research, and innovation. This book presents the proceedings of ICMR 2023, the 20th International Conference on Manufacturing Research, held from 6 – 8 September 2023 in Aberystwyth, Wales, UK. This annual conference is a friendly and inclusive platform for a broad community of researchers with the common goal of developing and managing the technolog...
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.
This book provides an overview of the current state of the art in wireless networks around the globe, focusing on utilizing the latest artificial intelligence and soft computing techniques to provide design frameworks for wireless networks. These techniques play a vital role in developing a more robust algorithm suitable for the dynamic and heterogeneous environment, making the network self-managed, self-operational, and self-configurational, and efficiently reducing uncertainties and imprecise information.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and...