You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordi...
This volume features a collection of papers on emerging concepts, significant insights, novel approaches and ideas in information systems development. It examines advances in information systems development in general, and their impact on the development of new methods, tools and management. The book draws on selected invited papers from the 26th International Conference on Information Systems Development (ISD) held in Larnaca, Cyprus, September 6 - 8, 2017. The revised and expanded papers present research that focuses on methods, tools and management in information systems development. These issues are significant as they provide the basis for organizations to identify new markets, support innovative technology deployment, and enable mobile applications to detect, sense, interpret and respond to the environment.
The REV Conference is the annual conference of the International Association of Online Engineering (IAOE) together with the Global Online Laboratory Consortium (GOLC). REV 2023 is the 20th in a series of annual events concerning the area of online engineering, cyber-physical systems and Internet of things, including remote engineering and virtual instrumentation. In a globally connected world, the interest in online collaboration, teleworking, remote services, and other digital working environments is rapidly increasing. In response to that, the general objective of this conference is to contribute and discuss fundamentals, applications, and experiences in the field of online and remote engineering, virtual instrumentation, and other related new technologies, including: Cross-reality Open Science Internet of Things and Industrial Internet of Things Industry 4.0 Cyber-security M2M and smart objects.
This volume constitutes the refereed proceedings of the 6th Hellenic Conference on Artificial Intelligence, SETN 2010, held in Athens, Greece, in May 2010. The 28 revised full papers and 22 revised short papers presented were carefully reviewed and selected from 83 submissions. The topics include but are not restricted to adaptive systems; AI and creativity; AI architectures; artificial life; autonomous systems; data mining and knowledge discovery; hybrid intelligent systems & methods; intelligent agents, multi-agent systems; intelligent distributed systems; intelligent information retrieval; intelligent/natural interactivity, intelligent virtual environments; knowledge representation and reasoning, logic programming; knowledge-based systems; machine learning, neural nets, genetic algorithms; natural language processing; planning and scheduling; problem solving, constraint satisfaction; robotics, machine vision, machine sensing.
This book constitutes the refereed proceedings of the Third IFIP-TC6 Networking Conference, NETWORKING 2004, held in Athens, Greece, in May 2004. The 103 revised full papers and 40 revised short papers were carefully reviewed and selected from 539 submissions. The papers are organized in topical sections on network security; TCP performance; ad-hoc networks; wavelength management; multicast; wireless network performance; inter-domain routing; packet classification and scheduling; services and monitoring; admission control; competition in networks; 3G/4G wireless systems; MPLS and related technologies; flow and congestion control; performance of IEEE 802.11; optical networks; TCP and congestion; key management; authentication and DOS prevention; energy aspects of wireless networks; optical network access; routing in ad-hoc networks; fault detection, restoration, and tolerance; QoS metrics, algorithms, and architecture; content distribution, caching, and replication; and routing theory and path computation.
Provides research on e-government and its implications within the global context. Covers topics such as digital government, electronic justice, government-to-government, information policy, and cyber-infrastructure research and methodologies.
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
This volume constitutes the proceedings of the 20th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2021, held in Galway, Ireland, in September 2021.* The total of 57 full and 8 short papers presented in these volumes were carefully reviewed and selected from 141 submissions. The papers are organized in the following topical sections: AI for Digital Transformation and Public Good; AI & Analytics Decision Making; AI Philosophy, Ethics & Governance; Privacy & Transparency in a Digitized Society; Digital Enabled Sustainable Organizations and Societies; Digital Technologies and Organizational Capabilities; Digitized Supply Chains; Customer Behavior and E-business; Blockchain; Information Systems Development; Social Media & Analytics; and Teaching & Learning. *The conference was held virtually due to the COVID-19 pandemic.
Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed in large numbers over an area to monitor different phenomenon. The sole motivation of a large portion of research efforts has been to maximize the lifetime of the network, where network lifetime is typically measured from the instant of deployment to the point when one of the nodes has expended its limited power source and becomes in-operational - commonly referred as first node failure. Over the years, research has increasingly adopted ideas from wireless communications as well as embedded systems development in order to move this technology closer to realistic deployment scenarios. In such a rich research area as wireless sensor networks, it is difficult if not impossible to provide a comprehensive coverage of all relevant aspects. In this book, we hope to give the reader with a snapshot of some aspects of wireless sensor networks research that provides both a high level overview as well as detailed discussion on specific areas.
Telecommunication Systems and Technologies theme is a component of Encyclopedia of Physical Sciences, Engineering and Technology Resources in the global Encyclopedia of Life Support Systems (EOLSS), which is an integrated compendium of twenty one Encyclopedias. Telecommunication systems are emerging as the most important infrastructure asset to enable business, economic opportunities, information distribution, culture dissemination and cross-fertilization, and social relationships. As any crucial infrastructure, its design, exploitation, maintenance, and evolution require multi-faceted know-how and multi-disciplinary vision skills. The theme is structured in four main topics: Fundamentals of Communication and Telecommunication Networks; Telecommunication Technologies; Management of Telecommunication Systems/Services; Cross-Layer Organizational Aspects of Telecommunications, which are then expanded into multiple subtopics, each as a chapter. These two volumes are aimed at the following five major target audiences: University and College students Educators, Professional practitioners, Research personnel and Policy analysts, managers, and decision makers and NGOs