You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordi...
This book presents the latest trends in scientific methods and enabling technologies to advance e-business. It consists of selected high-quality papers from the 16th International Conference on E-Business Engineering (ICEBE 2019), held in Shanghai, China, on 11–13 October 2019. ICEBE is a leading international forum for researchers, engineers, and business specialists to exchange cutting-edge ideas, findings, and experiences in the field of e-business. The book covers a range of topics, including agents for e-business, big data for e-business, Internet of Things, mobile and autonomous computing, security/privacy/trust, service-oriented and cloud computing, software engineering, blockchain, and industry applications.
This two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009. The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; netw...
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance,...
The three-volume set LNCS 13623, 13624, and 13625 constitutes the refereed proceedings of the 29th International Conference on Neural Information Processing, ICONIP 2022, held as a virtual event, November 22–26, 2022. The 146 papers presented in the proceedings set were carefully reviewed and selected from 810 submissions. They were organized in topical sections as follows: Theory and Algorithms; Cognitive Neurosciences; Human Centered Computing; and Applications. The ICONIP conference aims to provide a leading international forum for researchers, scientists, and industry professionals who are working in neuroscience, neural networks, deep learning, and related fields to share their new ideas, progress, and achievements.
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and manageme...
This book constitutes the refereed proceedings of the International Conference on Intelligent Computing, ICIC 2006, held in Kunming, China, in August 2006. The book presents 165 revised full papers, carefully reviewed. Topics covered include ant colony optimization, particle swarm optimization, swarm intelligence, autonomy-oriented computing, quantum and molecular computations, biological and DNA computing, intelligent computing in bioinformatics, intelligent computing in computational biology and drug design, computational genomics and proteomics, and more.
This 1179-page book assembles the complete contributions to the International Conference on Intelligent Computing, ICIC 2006: one volume of Lecture Notes in Computer Science (LNCS); one of Lecture Notes in Artificial Intelligence (LNAI); one of Lecture Notes in Bioinformatics (LNBI); and two volumes of Lecture Notes in Control and Information Sciences (LNCIS). Include are 149 revised full papers, and a Special Session on Computing for Searching Strategies to Control Dynamic Processes.
This is the proceedings of the International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 2006. The book presents 165 revised full papers, carefully chosen and reviewed, organized in topical sections on fuzzy systems, fuzzy-neuro-evolutionary hybrids, supervised, unsupervised and reinforcement learning, intelligent agent and Web applications, intelligent fault diagnosis, natural language processing and expert systems, natural language human-machine interface using artificial neural networks, and intelligent financial engineering.
This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009.