You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents papers from HealthyIoT 2018, the fifth edition of an international scientific event series dedicated to Internet of Things and Healthcare. The papers discuss leveraging a set of existing and emerging technologies, notions and services that can provide many solutions to delivery of electronic healthcare, patient care, and medical data management. HealthyIoT brings together technology experts, researchers, industry and international authorities contributing towards the design, development and deployment of healthcare solutions based on IoT technologies, standards, and procedures. HealthyIoT 2018 is part of the 4th annual Smart City 360 ̊Summit, promoting multidisciplinary s...
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. - Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures - Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks - Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of the 17th Portuguese Conference on Artificial Intelligence, EPIA 2015, held in Coimbra, Portugal, in September 2015. The 45 revised full papers presented together with 36 revised short papers were carefully reviewed and selected from a total of 131 submissions. EPIA 2015, following the standard EPIA format, covers a wide range of AI topics as follows: ambient intelligence and affective environments, artificial Intelligence in medicine, artificial intelligence in transportation systems, artificial life and evolutionary algorithms, computational methods in bioinformatics and systems biology, general artificial intelligence, intelligent information systems, intelligent robotics, knowledge discovery and business intelligence, multi-agent systems: theory and applications, social simulation and modelling, text mining and applications.
Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several ...
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniq...
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh City, Vietnam. The 34 revised full papers presented were carefully reviewed and selected from over 100 submissions. The papers cover formal methods for self-adaptive systems and discuss natural approaches and techniques for computation and communication.
Papers in ITJEMAST 10(17) 2019