You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the post-proceedings of the 7th International Conference on Mobile Networks and Management, MONAMI 2015, held in Santander, Spain, in September 2015. The 16 full papers were carefully reviewed and selected from 24 submissions. In addition there appears one short and 5 invited papers. These are organized thematically in five parts starting with Cellular Network Management and Self-Organizing Networks in Part I. Radio Resource Management in LTE and 5G Networks aspects are discussed in Part II. Part III presents novel Techniques and Algorithms for Wireless Networks, while Part IV deals with Video Streaming over Wireless Networks. Part V includes papers presenting avant-garde research on applications and services and, finally, Part VI features two papers introducing novel architectural approaches for Wireless Sensor Networks.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security.
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...
Modern Computational Techniques for Engineering Applications presents recent computational techniques used in the advancement of modern grids with the integration of non-conventional energy sources like wind and solar energy. It covers data analytics tools for smart cities, smart towns, and smart computing for sustainable development. This book- Discusses the importance of renewable energy source applications wind turbines and solar panels for electrical grids. Presents optimization-based computing techniques like fuzzy logic, neural networks, and genetic algorithms that enhance the computational speed. Showcases cloud computing tools and methodologies such as cybersecurity testbeds and data...
Raport jest pierwszym tego typu opracowaniem w polskim piśmiennictwie, szczególnie w tak oryginalnym i profesjonalnym ujęciu. […] Integralną i niezwykle ważną dla percepcji raportu część stanowią załączniki, które poszerzają zakres wiedzy zawartej w opracowaniu, ułatwiając jej zrozumienie. […] Raport zawiera autorskie ujęcie zjawiska relatywnie nowego w praktyce życia gospodarczego i proponuje zasady oraz metody zarządzania nim. Charakteryzuje się właściwym, interdyscyplinarnym podejściem. Napisano go na podstawie aktualnej – głównie angielskiej – literatury oraz z wykorzystaniem badań własnych autorów. Odpowiada na pilne i rosnące zapotrzebowanie praktyk...
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
Full of tips, case studies, tables and checklists this new title sets out the parameters of liability in respect of potential and actual cyber insurance claims and examines the significant areas where such claims will have the greatest impact. Covering First and Third party insurance, it provides the answers to questions such as: What is the extent to which a data breach can be protected or mitigated against by having suitable insurance in place? How does having insurance interplay with obligations under the GDPR? To what extent can insurance be used to safeguard driverless cars, drones and other AI-machines? How can insurance companies assist when hackers hold companies to ransom after stealing data? How can insurance assist with smart contracts on the blockchain and for potential coding errors? How can insurance mitigate against the hacking of online systems of manned ships?
Podjęte przez Autorów badania wpisują się w niezwykle istotny obecnie nurt działań mających na celu zwalczanie przyczyn przestępczości, a także służących zmniejszaniu możliwości jej występowania w tak społecznie istotnych sektorach jak finanse, ubezpieczenia, energetyka oraz zarządzanie zasobami ludzkimi… w pełni zasługuje na publikację, zarówno ze względu na wagę podejmowanej w niej tematyki, jak i ze względu na wysoki poziom naukowy dzieła. dr hab. Andrzej Szymański, prof. UO Potrzeba podjęcia zaawansowanych prac badawczych odnoszących się do przyczyn przestępczości w kluczowych obszarach gospodarki nie podlega kwestionowaniu. Dodatkowo o wartości naukowej recenzowanej pracy przesądza interdyscyplinarność podejścia do eksplorowanej tematyki, staranność doboru adekwatnej metodologii oraz doniosłość uzyskanych wyników analizy. Użyteczność tych efektów przejawia się przede wszystkim w stworzeniu odpowiednich podstaw do przyjęcia rozwiązań zwiększających efektywność przeciwdziałania przestępczości w powyższych sferach gospodarczych. dr hab. Bartosz Majchrzak, prof. UKSW
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.