You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation and digital forensics in the cloud.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have...
"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts in areas of research relevant to the study of complex, intelligent, and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. The book is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, the volume provides insights into the multidisciplinary nature of complex problems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent system design. This book presents the most recent interdisciplinary results in this area of research and can serve as a valuable tool for researchers interested in defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence.
This book focuses on different algorithms and models related to AI, big data and IoT used for various domains. It enables the reader to have a broader and deeper understanding of several perspectives regarding the dynamics, challenges, and opportunities for sustainable development using artificial intelligence, big data and IoT. Applications of Artificial Intelligence, Big Data and Internet of Things (IoT) in Sustainable Development focuses on IT-based advancements in multidisciplinary fields such as healthcare, finance, bioinformatics, industrial automation, and environmental science. The authors discuss the key issues of security, management, and the realization of possible solutions to hu...
This book constitutes the proceedings of the 10th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2014, held in conjunction with CAiSE 2014 in Thessaloniki, Greece, in June 2014. Tools and methods for modeling and simulation are widely used in enterprise engineering, organizational studies, and business process management. In monitoring and evaluating business processes and the interactions of actors in a realistic environment, modeling and simulation have proven to be both powerful, efficient, and economic, especially if complemented by animation and gaming elements. The 12 contributions in this volume were carefully reviewed and selected from 22 submissions. They explore the above topics, address the underlying challenges, find and improve solutions, and show the application of modeling and simulation in the domains of enterprises, their organizations and underlying business processes.
This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed f...
This book constitutes the refereed conference proceedings of the 25th International Conference on Information Integration and Web Intelligence, iiWAS 2023, organized in conjunction with the 21st International Conference on Advances in Mobile Computing and Multimedia Intelligence, MoMM2023, held in Denpasar, Bali, Indonesia, during December 4-6, 2023. The 24 full papers and 24 short papers presented in this book were carefully reviewed and selected from 96 submissions. The papers are divided into the following topical sections: business data and applications; data management; deep and machine Learning; generative AI; image data and knowledge graph; recommendation systems; similarity measure and metric; and topic and text matching.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).
This book provides the latest research findings, and discusses, from both theoretical and practical perspectives, innovative research methods and development techniques related to intelligent social networks and collaborative systems, intelligent networking systems, mobile collaborative systems and secure intelligent cloud systems. It also presents the synergies among various paradigms in such a multi-disciplinary field of intelligent collaborative systems. With the rapid development of the Internet, we are experiencing a shift from the traditional sharing of information and applications as the main purpose of the Web to an emergent paradigm, which locates people at the very centre of networ...