Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cyber-Security in Critical Infrastructures
  • Language: en
  • Pages: 297

Cyber-Security in Critical Infrastructures

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically imp...

Automated Reasoning
  • Language: en
  • Pages: 493

Automated Reasoning

None

Traumfänger
  • Language: de
  • Pages: 370

Traumfänger

Lara Johannson versteht endlich, weshalb sie ein Burnout erlitten hat. Der Weg dorthin war beschwerlich und hart, mit Stolpersteinen gepflastert und voller Rückschläge. Der Grund ihrer Erkrankung liegt viel weiter zurück, als sie bisher geglaubt hat. Eine Therapie hat ihr geholfen, das zu erkennen, und gibt ihr nun den Mut, ihr Leben so zu leben, wie sie es sich erträumt hat. Kurz entschlossen wirft sie ihren bisher geliebten Job hin und beginnt ein neues Leben in Heiligenhafen an der Ostsee. Dort erlernt sie nicht nur einen neuen Beruf, sondern findet auch die verlorene geglaubte Liebe zum Reiten wieder. Doch das ist noch nicht alles: In der kleinen Stadt trifft sie auf den Stallbursche...

Guide to Disaster-Resilient Communication Networks
  • Language: en
  • Pages: 813

Guide to Disaster-Resilient Communication Networks

This authoritative volume presents a comprehensive guide to the evaluation and design of networked systems with improved disaster resilience. The text offers enlightening perspectives on issues relating to all major failure scenarios, including natural disasters, disruptions caused by adverse weather conditions, massive technology-related failures, and malicious human activities. Topics and features: describes methods and models for the analysis and evaluation of disaster-resilient communication networks; examines techniques for the design and enhancement of disaster-resilient systems; provides a range of schemes and algorithms for resilient systems; reviews various advanced topics relating ...

Decision and Game Theory for Security
  • Language: en
  • Pages: 652

Decision and Game Theory for Security

  • Type: Book
  • -
  • Published: 2018-10-22
  • -
  • Publisher: Springer

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Smart Cities: Cyber Situational Awareness to Support Decision Making
  • Language: en
  • Pages: 134

Smart Cities: Cyber Situational Awareness to Support Decision Making

This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regard...

Software Engineering and Formal Methods
  • Language: en
  • Pages: 373

Software Engineering and Formal Methods

This book constitutes the refereed proceedings of the 20th International Conference on Software Engineering and Formal Methods, SEFM 2022, which took place in Berlin, Germany, in September 2022. The 19 full and 3 short papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: software verification; program analysis; verifier technology; formal methods for intelligent and learning systems; specification and contracts; program synthesis; temporal logic; and runtime methods.

Systems, Software and Services Process Improvement
  • Language: en
  • Pages: 753

Systems, Software and Services Process Improvement

This volume constitutes the refereed proceedings of the 28th European Conference on Systems, Software and Services Process Improvement, EuroSPI 2021, held in Krems, Austria, in September 2021*. The 42 full papers and 9 short papers presented were carefully reviewed and selected from 100 submissions. The volume presents core research contributions and selected industrial contributions. Core research contributions: SPI and emerging software and systems engineering paradigms; SPI and team skills and diversity; SPI and recent innovations; SPI and agile; SPI and standards and safety and security norms; SPI and good/bad SPI practices in improvement; SPI and functional safety and cybersecurity; digitalisation of industry, infrastructure and e-mobility. Selected industrial contributions: SPI and emerging software and systems engineering paradigms; SPI and recent innovations; SPI and agile; SPI and standards and safety and security norms; SPI and good/bad SPI practices in improvement; SPI and functional safety and cybersecurity; digitalisation of industry, infrastructure and e-mobility; virtual reality. *The conference was partially held virtually due to the COVID-19 pandemic.

Formal Methods
  • Language: en
  • Pages: 661

Formal Methods

This book constitutes the refereed proceedings of the 25th International Symposium on Formal Methods, FM 2023, which took place in Lübeck, Germany, in March 2023. The 26 full paper, 2 short papers included in this book were carefully reviewed and selected rom 95 submissions. They have been organized in topical sections as follows: SAT/SMT; Verification; Quantitative Verification; Concurrency and Memory Models; Formal Methods in AI; Safety and Reliability. The proceedings also contain 3 keynote talks and 7 papers from the industry day.

Game Theory and Machine Learning for Cyber Security
  • Language: en
  • Pages: 546

Game Theory and Machine Learning for Cyber Security

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities o...