You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
These proceedings represent the work of researchers participating in the 15th European Conference on Cyber Warfare and Security (ECCWS 2016) which is being hosted this year by the Universitat der Bundeswehr, Munich, Germany on the 7-8 July 2016. ECCWS is a recognised event on the International research conferences calendar and provides a valuable plat-form for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyberwar and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and ex-panding range of Cyb...
This volume of the Lecture Notes in Computer Science series contains the papers accepted for presentation at the Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008). The conference took place in Bremen, Germany, hosted by the Jacobs University Bremen. AIMS 2008 was - ganized and supported by the EC IST-EMANICS Network of Excellence (#26854) in cooperation with ACM SIGAPP and ACM SIGMIS and co-sponsored by IFIP WG 6.6 and Jacobs University Bremen. This year’s AIMS 2008 constituted the second edition of a single-track and standalone conference on management and security aspects of distributed and autonomous systems, which took place initially in ...
This book constitutes the refereed proceedings of the 11th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2000, held in Austin, TX, USA in December 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 65 submissions. The book is divided into topical sections on architectures for internet management, fault management of services and networks, inter-domain management, event handling for management services, QoS management, and management architectures.
Machine learning has become key in supporting decision-making processes across a wide array of applications, ranging from autonomous vehicles to malware detection. However, while highly accurate, these algorithms have been shown to exhibit vulnerabilities, in which they could be deceived to return preferred predictions. Therefore, carefully crafted adversarial objects may impact the trust of machine learning systems compromising the reliability of their predictions, irrespective of the field in which they are deployed. The goal of this book is to improve the understanding of adversarial attacks, particularly in the malware context, and leverage the knowledge to explore defenses against adaptive adversaries. Furthermore, to study systemic weaknesses that can improve the resilience of machine learning models.
Welcome to IM'97! We hope you had the opportunity to attend the Conference in beautiful San Diego. If that was the case, you will want to get back to these proceedings for further read ings and reflections. You'll find e-mail addresses of the main author of each paper, and you are surely encouraged to get in touch for further discussions. You can also take advantage of the CNOM (Committee on Network Operation and Management) web site where a virtual discus sion agora has been set up for IM'97 (URL: http://www.cselt.stet.it/CNOMWWWIIM97.html). At this site you will find a brief summary of discussions that took place in the various panels, and slides that accompanied some of the presentations-...
This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 13th International Symposium on Recent Advances in Intrusion Detection Systems (RAID 2010), which took place in Ottawa, Ontario, Canada, during September 15-17, 2010. As in the past, the symposium brought together leading researchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were eight technical sessionspresentingfullresearchpapersonnetworkprotection,highperformance, malwaredetectionanddefense(2 sessions),evaluation,forensics,anomalydet- tion and access protection, and Web security. Furthermore, there was a poster session present...
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.