You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book includes a set of selected papers from the first "International Conference on Enterprise Information Systems," (ICEIS'99) held in SeÜtbal, Portugal, from 27 to 30 March 1999. ICEIS focuses on real world applications and aims at becoming a major point of contact between research scientists, engineers and practitioners in the area of business applications of information systems. This year four simultaneous tracks were held, covering different aspects related to enterprise computing, including: Systems Analysis and Specijication, Database Technology and its Applications, Artijicial Intelligence and Decision Support Systems, and Internet and Intranet Computing. Although ICEIS'99 recei...
This book constitutes the refereed proceedings of the First Latin-American Symposium on Dependable Computing, LADC 2003, held in Sao Paulo, Brazil in October 2003. The 21 revised full papers presented together with abstracts of invited talks, a panel, workshops, and tutorials were carefully reviewed and selected for presentation. The papers are organized in topical sections on fault injection, security, adaptive fault tolerance, distributed algorithms, and components and fault tolerance.
This book constitutes the refereed proceedings of the Second Latin-American Symposium on Dependable Computing, LADC 2005, held in Salvador, Brazil, in October 2005. The 16 revised full papers presented together with 3 invited talks, and outlines of 2 workshops and 3 tutorials, were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on evaluation, certification, modelling, embedded systems, time, and distributed systems algorithms.
This book constitutes the refereed proceedings of the 9th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2006, held in Dublin, Ireland in October 2006 in the course of the 2nd International Week on Management of Networks and Services, Manweek 2006. The 18 revised full papers and six revised short papers presented were carefully reviewed and selected from 71 submissions.
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. The four volumes contain papers presented in the following workshops: 7333 - advances in high performance algorithms and applications (AHPAA); bioinspired computing and applications (BIOCA); computational geometry and applicatons (CGA); chemistry and materials sciences and technologies (CMST); cities, technologies and planning (CTP); 7334 - econometrics and multidimensional evaluation in the urban environment (EMEUE); geographical analysis, urban modeling, spatial statistics (Ge...
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
None
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The ...
Em virtude do aumento das operações realizadas pela Internet, intensificada pela pandemia de COVID-19, é fundamental a proteção das informações que trafegam pela Internet e por outras redes de dados, tais como Internet das Coisas (IoT). O tema evolui constantemente, pois são descobertas novas vulnerabilidades que dão origem a novos tipos de ataques às redes corporativas, governamentais e pessoais. Esta obra trata de forma panorâmica a Segurança Cibernética, está organizada em 11 capítulos e aborda temas como os atacantes virtuais, os tipos de ataques, softwares e hardwares utilizados para defesa, gestão de risco e a atuação de profissionais da área. Além dos interessados no assunto, o livro é recomendado para componentes curriculares da área de Redes de Computadores, Segurança da Informação e Segurança Cibernética e outros cursos que utilizam redes computacionais para o desenvolvimento de soluções tais como Análise e Desenvolvimento de Sistemas, Gestão da Tecnologia de Informação, Engenharia de Computação, Ciência de Computação e de cursos de pós-graduação que abordem sobre Segurança Cibernética.