You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment, cost evaluation and comprehensive defence. This monograph is suitable for practitioners, professionals, and researchers engaged in critical infrastructure protection.
This volume constitutes the refereed proceedings of the Third International Conference on Industrial Applications of Holonic and Multi-Agent Systems held in September 2007. The 39 full papers were selected from among 63 submissions. They are organized into topical sections covering theoretical and methodological issues, algorithms and technologies, implementation and validation, applications, and supply chain management.
With the progression of technological breakthroughs creating dependencies on telecommunications, the internet, and social networks connecting our society, CIIP (Critical Information Infrastructure Protection) has gained significant focus in order to avoid cyber attacks, cyber hazards, and a general breakdown of services. Critical Information Infrastructure Protection and Resilience in the ICT Sector brings together a variety of empirical research on the resilience in the ICT sector and critical information infrastructure protection in the context of uncertainty and lack of data about potential threats and hazards. This book presents a variety of perspectives on computer science, economy, risk analysis, and social sciences; beneficial to academia, governments, and other organisations engaged or interested in CIIP, Resilience and Emergency Preparedness in the ICT sector.
The focus of the book is on completed implementations of agent-based software systems. Here, agent technology is considered broadly, starting from development of agent platforms, all the way through systems actually implemented. The covered topics also include lessons learned during implementation of agent platforms and the reflection on the process of development and application of agent-based systems. The book includes 10 chapters where interested reader can find discussion of important issues encountered during development of well-known agent platforms such as JADE and Jadex as well as some interesting experiences in developing a new platform that combines software agent and Web Services. Furthermore, the book shows readers several valuable examples of applications based on multi-agent systems including simulations, agents in autonomous negotiations and agents in public administration modelling. We believe that the book will prove useful to the researchers, professors and the practitioners in all disciplines including science and technology.
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. "Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms. "Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020. The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.
Jeśli istniałoby lustro, które odbijałoby nasz obraz według maksymy „jesteś tym, co jesz”, co chcielibyśmy w nim zobaczyć? Masową hodowlę zwierząt, które w swoim krótkim życiu nie widzą nawet światła słonecznego? Sterylną halę, w której naturalny smak, zapach i wygląd zastępują polepszacze, wypełniacze i stabilizatory? A może półkę z produktami tak powszechnymi, że mogłaby stanąć w każdym supermarkecie jak świat długi i szeroki?
This book constitutes the refereed proceedings of the S3E 2023 Topical Area, 24th Conference on Practical Aspects of and Solutions for Software Engineering, KKIO 2023, and 8th Workshop on Advances in Programming Languages, WAPL 2023, as Part of FedCSIS 2023, held in Warsaw, Poland, during September 17–20, 2023. The 6 revised papers presented in this book were carefully reviewed and selected from a total of 55 submissions. They focus on new ideas and developments in practical aspects and solutions for software engineering.