You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.
This book constitutes the revised selected papers of the 12th International Symposium on Foundations and Practice of Security, FPS 2019, held in Toulouse, France, in November 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 50 submissions. They cover a range of topics such as machine learning approaches; attack prevention and trustworthiness; and access control models and cryptography.
This policy-oriented jurisprudence presents the latest research findings on legal challenges faced by the international regulatory framework, as posed by the increasing deployment of uncrewed vessels at sea. It is the first publication that offers discussions and opinions reflecting a combined international and comparative (especially, eastern) perspective. The contributors from multiple jurisdictions elaborate on legal implications of the use of uncrewed vessels for military, commercial, scientific-research, and law-enforcement purposes from such diverse angles as the law of the sea, international humanitarian law, the law of war, global shipping regulation, marine environment protection, cybersecurity, and artificial intelligence and law.
This book constitutes the proceedings of the 11th International Conference on Spatial Information Theory, COSIT 2013, held in Scarborough, UK, in September 2013. The 28 papers presented in this book were carefully reviewed and selected from 62 full paper submissions. The following topics are addressed: spatial change, wayfinding and assistance, representing spatial data, handling language data, spatial language and computation, spatial ontology, spatial reasoning and representation.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
This book constitutes the refereed proceedings of the Second International Conference on GeoSpatial Semantics, GeoS 2007, held in Mexico City, Mexico, in November 2007. The papers are organized in topical sections on models and languages for geo-ontologies, alignment and integration of geo-ontologies, ontology-based spatial information retrieval, formal representation for geospatial data, and integration of semantics into spatial query processing.
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive.
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original cont...
This book constitutes the refereed conference proceedings of the 14th International Symposium, W2GIS 2015, held in Grenoble, France, in May 2015. The 12 revised full papers presented were carefully selected from 19 submissions. Selected papers cover hot topics related to W2GIS including spatiotemporal data collection, processing and visualization, mobile user generated content, semantic trajectories, locationbased Web search, Cloud computing and VGI approaches.
Catalogue of offprints from vols. 1-20 in v. 20, p. [527]-541.