You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique angle on the topic of national cyber threat intelligence and security information sharing. It also provides a clear view on ongoing works in research laboratories world-wide in order to address current security concerns at national level. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
Based on the “Fourth International Conference on Dynamics of Disasters” (Kalamata, Greece, July 2019), this volume includes contributions from experts who share their latest discoveries on natural and unnatural disasters. Authors provide overviews of the tactical points involved in disaster relief, outlines of hurdles from mitigation and preparedness to response and recovery, and uses for mathematical models to describe natural and man-made disasters. Topics covered include economics, optimization, machine learning, government, management, business, humanities, engineering, medicine, mathematics, computer science, behavioral studies, emergency services, and environmental studies will engage readers from a wide variety of fields and backgrounds.
Socially enhanced Services Computing deals with a novel and exciting new field at the intersection between Social Computing, Service-oriented Computing, Crowd Computing, and Cloud Computing. The present work presents a collection of selected papers by the editors of this volume, which they feel will help the reader in understanding this field. The approach discussed allows for a seamless integration of people into trusted dynamic compositions of Human-provided Services and Software-based services, thus empowering new interaction models and processes in massive collaboration scenarios in a Future Internet.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.
In this 2012 edition of Advances in Knowledge-Based and Intelligent Information and Engineering Systems the latest innovations and advances in Intelligent Systems and related areas are presented by leading experts from all over the world. The 228 papers that are included cover a wide range of topics. One emphasis is on Information Processing, which has become a pervasive phenomenon in our civilization. While the majority of Information Processing is becoming intelligent in a very broad sense, major research in Semantics, Artificial Intelligence and Knowledge Engineering supports the domain specific applications that are becoming more and more present in our everyday living. Ontologies play a...
The rapidly evolving landscape of artificial intelligence (AI) has created unprecedented shifts in nearly all aspects of business and life. To manage human resources more effectively, understanding the intersection of consumer behavior and organizational management has never been more crucial. By synthesizing the latest research and practical applications, managers will be equipped with the tools necessary to lead and innovate in their respective fields. Consumer and Organizational Behavior in the Age of AI represents a comprehensive and interdisciplinary effort to provide a deep understanding of these dynamics, offering strategies to address challenges, plan strategically, execute effectively, and measure performance for continuous improvement across public, private, and civil society sectors. Covering topics such as crisis management, firm strategy, and purchase intention, this book is an excellent resource for organizational leaders, managers, human resource managers, academicians, graduate and postgraduate students, educators, and more.
This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.
This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021. The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services.
This book constitutes the proceedings of the 10th International Conference on Web Information Systems Engineering, WISE 2009, held in Poznan, Poland, in October 2009. The 33 revised full papers and 17 revised short papers presented together with two keynote talks were carefully reviewed and selected from around 144 submissions. The papers are organized in topical sections on web computing, industrial session, tagging, semantics, search, visualization, web services, trust and uncertainty, recommendation and quality of service, user interfaces, web understanding, exploiting structures information on the web, systems, data mining and querying, querying and workflow and architecture.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.