You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2017, held in Reggio, Italy, in August/September 2017. The 24 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers deal with fundamental questions and theoretical aspects and cover a wide range of topics in the field of machine learning and knowledge extraction. They are organized in the following topical sections: MAKE topology; MAKE smart factory; MAKE privacy; MAKE VIS; MAKE AAL; and MAKE semantics.
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
This book constitutes the refereed conference proceedings of the 25th International Conference on Information Integration and Web Intelligence, iiWAS 2023, organized in conjunction with the 21st International Conference on Advances in Mobile Computing and Multimedia Intelligence, MoMM2023, held in Denpasar, Bali, Indonesia, during December 4-6, 2023. The 24 full papers and 24 short papers presented in this book were carefully reviewed and selected from 96 submissions. The papers are divided into the following topical sections: business data and applications; data management; deep and machine Learning; generative AI; image data and knowledge graph; recommendation systems; similarity measure and metric; and topic and text matching.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017. The 12 revised full papers were carefully selected from 41 submissions on the basis of significance, novelty, and scientific quality. These selected papers are organized in three different chapters corresponding to the conference sessions. The first chapter, “Data Protection Regulation”, discusses topics concerning big genetic data, a privacy-preserving European identity ecosystem, the right to be forgotten und the re-use of privacy risk analysis. The second chapter, “Neutralisation and Anonymization”, discusses neutralisation of threat actors, privacy by design data exchange between CSIRTs, differential privacy and database anonymization. Finally, the third chapter, “Privacy Policies in Practice”, discusses privacy by design, privacy scores, privacy data management in healthcare and trade-offs between privacy and utility.
This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking
This book constitutes the refereed proceedings of the 10th Software Quality Days Conference, SWQD 2018, held in Vienna, Austria, in January 2018. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conferences on software quality in Europe with a strong community. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2018 is “Software Quality 4.0: Methods and Tools for better Software and Systems”, as novel technologies include new challenges and might require new and adapted methods and tools to support quality assurance activities early. The 6 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The volume also contains 2 invited talks. The contributions were organized in topical sections named: safety and security; requirements engineering and requirements-based testing; crowdsourcing in software engineering; software and systems architecture; experimentation in software engineering; and smart environments.
The REV Conference is the annual conference of the International Association of Online Engineering (IAOE) together with the Global Online Laboratory Consortium (GOLC). REV 2023 is the 20th in a series of annual events concerning the area of online engineering, cyber-physical systems and Internet of things, including remote engineering and virtual instrumentation. In a globally connected world, the interest in online collaboration, teleworking, remote services, and other digital working environments is rapidly increasing. In response to that, the general objective of this conference is to contribute and discuss fundamentals, applications, and experiences in the field of online and remote engineering, virtual instrumentation, and other related new technologies, including: Cross-reality Open Science Internet of Things and Industrial Internet of Things Industry 4.0 Cyber-security M2M and smart objects.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital For...
One of the grand challenges in our digital world are the large, complex and often weakly structured data sets, and massive amounts of unstructured information. This “big data” challenge is most evident in biomedical informatics: the trend towards precision medicine has resulted in an explosion in the amount of generated biomedical data sets. Despite the fact that human experts are very good at pattern recognition in dimensions of = 3; most of the data is high-dimensional, which makes manual analysis often impossible and neither the medical doctor nor the biomedical researcher can memorize all these facts. A synergistic combination of methodologies and approaches of two fields offer ideal...
Unleash the power of cloud computing using Azure, AWS and Apache HadoopÊ Description With the advent of internet, there is a complete paradigm shift in the manner we comprehend computing. Need to enable ubiquity, convenient and on-demand access to resources in highly scalable and resilient environments that can be remotely accessed, gave birth to the concept of Cloud computing. The acceptance is so rapid that the notion influences sophisticated innovations in academia, industry and research world-wide and hereby change the landscape of information technology as we thought of. Through this book, the authors tried to incorporate core principles and basic notion of cloud computing in a step-by...