You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 132 selected papers from the 21st International Conference on Intelligent Systems Design and Applications (ISDA 2021), which was held online. The ISDA is a premier conference in the field of computational intelligence, and the latest installment brought together researchers, engineers and practitioners whose work involves intelligent systems and their applications in industry. Including contributions by authors from 34 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
Ongoing advancements in modern technology have led to significant developments in intelligent systems. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Intelligent Systems: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on the latest breakthroughs and recent progress in intelligent systems. Including innovative studies on information retrieval, artificial intelligence, and software engineering, this multi-volume book is an ideal source for researchers, professionals, academics, upper-level students, and practitioners interested in emerging perspectives in the field of intelligent systems.
The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperat...
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For priv...
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Sensor Systems and Software, S-Cube 2014, held in Coventry, UK, in October 2014. The 12 revised full papers presented were selected from 16 submissions and cover technologies for wireless sensor networks, including security protocols, middleware, analysis tools and frameworks.
This book comprises selected papers from the 16th International Conference on Intelligent Systems Design and Applications (ISDA’16), which was held in Porto, Portugal from December 1 to16, 2016. ISDA 2016 was jointly organized by the Portugual-based Instituto Superior de Engenharia do Porto and the US-based Machine Intelligence Research Labs (MIR Labs) to serve as a forum for the dissemination of state-of-the-art research and development of intelligent systems, intelligent technologies, and applications. The papers included address a wide variety of themes ranging from theories to applications of intelligent systems and computational intelligence area and provide a valuable resource for students and researchers in academia and industry alike.
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.