You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains the Proceedings of the 4th International Conference on Intelligent Interactive Multimedia Systems and Services (IIMSS-2011). IIMSS-2011 comes as a sequel to IIMSS-2008 (Piraeus-Athens, Greece, July 9, 10 and 11, 2008), IIMSS-2009 (Mogliano Veneto (near Venice), Italy, July 15, 16 and 17, 2009) and IIMSS-2010 (Baltimore, USA, July 28, 29, and 30, 2010). This fourth edition of the IIMSS Conference was organized jointly by the Department of Informatics of the University of Piraeus, Greece and the School of Electrical and Information Engineering of the University of South Australia, in conjunction with KES International. At a time when computers are more widespread than ever...
KES International (KES) is a worldwide organisation that provides a professional community and association for researchers, originally in the discipline of Knowledge Based and Intelligent Engineering Systems, but now extending into other related areas. Through this, KES provides its members with opportunities for publication and beneficial interaction. The focus of KES is research and technology transfer in the area of Intelligent S- tems, i.e. computer-based software systems that operate in a manner analogous to the human brain, in order to perform advanced tasks. Recently KES has started to extend its area of interest to encompass the contribution that intelligent systems can make to susta...
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for e...
Modern Computational Techniques for Engineering Applications presents recent computational techniques used in the advancement of modern grids with the integration of non-conventional energy sources like wind and solar energy. It covers data analytics tools for smart cities, smart towns, and smart computing for sustainable development. This book- Discusses the importance of renewable energy source applications wind turbines and solar panels for electrical grids. Presents optimization-based computing techniques like fuzzy logic, neural networks, and genetic algorithms that enhance the computational speed. Showcases cloud computing tools and methodologies such as cybersecurity testbeds and data...
This volume constitutes the proceedings of the Forth International Conference on Cyberspace Data and Intelligence, Cyber DI 2020, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2020, held under the umbrella of the 2020 Cyberspace Congress, held in Beijing, China, in December 2020.* The 13 full papers presented were carefully reviewed and selected from 36 submissions. The papers are grouped in the following topics: machine learning and ubiquitous and intelligent computing. * The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems. This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel architectures in artificial intelligence, machine learning, and data science in the field of healthcare and IoT. IoMT includes a wide range of connected medical devices and systems, such as wearable devices, medical sensors, and electronic health records, that collect, store, and share sensitive medical information. Without proper security measures, this information could be compromised, leading to serious privacy breaches, financial fraud, and even physical harm to patients.
Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is embedded behind intellectual property and technological barriers. It proposes that the EU introduce an access and transfer governance right to data that can work in tandem with data protection rules. Chapters explore the subject matter of this protection, potential rights holders and the scope of the protection, and exceptions and limitations under intellectual property law and competition law. Comprehensive and timely, Regulating Access and Transfer of Data sets the foundations for a new legal system for our data-driven generation.
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.