You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed proceedings of seven international workshops held in Stockholm, Sweden, in conjunction with the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, in June 2015. The 38 full and nine short papers were carefully selected from 107 submissions. The workshops were the Second International Workshop on Advances in Services Design based on the Notion of Capability (ASDENCA), the Third International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the First International Workshop on Digital Business Innovation and the Future Enterprise Information Systems Engineering (DiFenSE), the First International Workshop on Enterprise Modeling (EM), the First Workshop on the Role of Real-World Objects in Business Process Management Systems (RW-BPMS), the 10th International Workshop on Trends in Enterprise Architecture Research (TEAR), and the 5th International Workshop on Information Systems Security Engineering (WISSE).
This volume constitutes the proceedings of the 4th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling, held in Oslo, Norway, during November 2-3, 2011. The conference series is a dedicated forum where the use of enterprise modeling (EM) in practice is addressed by bringing together researchers, users, and practitioners in order to develop a better understanding of the practice of EM, to contribute to improved industrial EM applications, and to share knowledge and experiences. The 18 papers presented were carefully reviewed and selected from 38 submissions. Authored by both researchers and practitioners, they reflect the fact that EM encompasses human, organizational issues as well as technical aspects related to the development of information systems. The papers are organized in five thematic sessions on process modeling, business modeling, enterprise architecture, EM, and model-driven development. In addition, two keynotes on EM in an agile world and on intra- and inter-organizational process mining complete the volume.
Information Systems Development: Business Systems and Services: Modeling and Development, is the collected proceedings of the 19th International Conference on Information Systems Development held in Prague, Czech Republic, August 25 - 27, 2010. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education. These proceedings represent ongoing reflections within the academic community on established information systems topics and emerging concepts, approaches and ideas. It is hoped that the papers herein contribute towards disseminating research and improving practice.
Chapter “A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the refereed proceedings of the 20th International Conference on Advanced Information Systems Engineering, CAiSE 2008, held in Montpellier, France, in June 2008. The 35 revised full papers and 9 revised short papers presented together with 1 keynote lecture were carefully reviewed and selected from 273 submissions. The papers are organized in topical sections on duality and process modelling, interoperability of IS and enterprises, refactoring, information systems in e-government and life-science, knowledge patterns for IS engineering, requirements engineering for IS, conceptual schema modelling, service infrastructure, service evolution, flexible information technologies, metrics and process modelling, information system engineering, and IS development with ubiquitous technologies.
This volume constitutes the proceedings of the Third IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling, held in Delft, The Netherlands, during November 9-10, 2010. The goal of the conference is both to foster a better understanding of the practice of enterprise modeling and to improve its theoretical foundations. The 17 papers presented were carefully reviewed and selected from 44 submissions. They reflect the trend for both practitioners and academics to look into domains and conceptualizations addressing dedicated business-oriented topics like business intelligence or domain-driven process families, and thus reach beyond traditional information systems engineering.
This book constitutes the post-conference proceedings of the CAiSE Forum from the 22nd International Conference on Advanced Information Systems Engineering (CAiSE 2010), held in Hammamet, Tunisia, June 9, 2010. While the CAiSE conference itself focuses on papers that report on matured research, the CAiSE forum was created specifically as a platform to present fresh ideas, new concepts, and new and innovative systems, tools, and applications. The 22 papers presented in this volume were carefully reviewed and selected from 32 submissions. The reworked and extended versions of the original presentations cover topics such as business process management, enterprise architecture and modeling, service-oriented architectures, and requirements engineering.
A comprehensive and up-to-date application of reinforcement learning concepts to offensive and defensive cybersecurity In Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing, a team of distinguished researchers delivers an incisive and practical discussion of reinforcement learning (RL) in cybersecurity that combines intelligence preparation for battle (IPB) concepts with multi-agent techniques. The authors explain how to conduct path analyses within networks, how to use sensor placement to increase the visibility of adversarial tactics and increase cyber defender efficacy, and how to improve your organization's cyber posture with RL a...
This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019. The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.