You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven en...
This book contains extended and revised versions of a set of selected papers from two workshops organized by the Euro Working Group on Decision Support Systems (EWG-DSS), which were held in Thessaloniki, Greece, and Rome, Italy, in May and July 2013. From a total of 45 submissions, 15 papers were accepted for publication in this edition after being reviewed by at least three internationally known experts from the EWG-DSS Program Committee and external invited reviewers. The selected papers are representative of current research activities in the area of operational research and decision support systems, focusing on topics such as decision-making using social networks and Web resources; spatio-temporal Web-based decision making; group support systems; technical, legal, and social aspects of decision making; knowledge management and decision support systems; business intelligence and data warehousing; and negotiation support systems.
Proceedings of the EWG-DSS Thessaloniki-2013 Workshop on Exploring New Directions for Decisions in the Internet Age Thessaloniki, Greece May 29th- 31st, 2013
This book constitutes revised selected papers of the 7th International Workshop on Formal Aspects of Component Software, FACS 2010, held in Guimarães, Portugal, in October 2010. The 13 full papers and 4 short papers presented together with 1 panel discussion and 2 invited talks were carefully reviewed and selected from 37 submissions. The workshop seeks to develop a better understanding on how formal methods can or should be used for component-based software development to succeed.
Covid Conspiracy Theories in Global Perspective examines how conspiracy theories and related forms of misinformation and disinformation about the Covid-19 pandemic have circulated widely around the world. Covid conspiracy theories have attracted considerable attention from researchers, journalists, and politicians, not least because conspiracy beliefs have the potential to negatively affect adherence to public health measures. While most of this focus has been on the United States and Western Europe, this collection provides a unique global perspective on the emergence and development of conspiracy theories through a series of case studies. The chapters have been commissioned by recognized e...
The three-volume set LNCS 8016, 8017, and 8018 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. This volume contains papers in the thematic area of human interface and the management of Information, addressing the following major topics: learning, education and skills transfer, art and cultural heritage, collaborative work, business integration and decision support.
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.
Microbes are ubiquitous in nature. Among microbes, fungal communities play an important role in agriculture, the environment, and medicine. Vast fungal diversity has been associated with plant systems, namely epiphytic fungi, endophytic fungi, and rhizospheric fungi. These fungi associated with plant systems play an important role in plant growth, crop yield, and soil health. Rhizospheric fungi, present in rhizospheric zones, get their nutrients from root exudates released by plant root systems, which help with their growth, development, and microbe activity. Endophytic fungi typically enter plant hosts through naturally occurring wounds that are the result of plant growth, through root hair...