You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.
In view of the incessant growth of data and knowledge and the continued diversifi- tion of information dissemination on a global scale, scalability has become a ma- stream research area in computer science and information systems. The ICST INFO- SCALE conference is one of the premier forums for presenting new and exciting research related to all aspects of scalability, including system architecture, resource management, data management, networking, and performance. As the fourth conf- ence in the series, INFOSCALE 2009 was held in Hong Kong on June 10 and 11, 2009. The articles presented in this volume focus on a wide range of scalability issues and new approaches to tackle problems arising from the ever-growing size and c- plexity of information of all kind. More than 60 manuscripts were submitted, and the Program Committee selected 22 papers for presentation at the conference. Each s- mission was reviewed by three members of the Technical Program Committee.
The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) will be held in Jeju, Korea on November 22~25, 2012. CSA-12 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications. CSA-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. CSA-12 is the next event in a series of highly successful International Conference on Computer Science and its Applications, previously held as CSA-11 (3rd Edition: Jeju, December, 2011), CSA-09 (2nd Edition: Jeju, December, 2009), and CSA-08 (1st Edition: Australia, October, 2008).
Advances in digital and other technologies have provided ample positive impacts to modern society; however, in addition to such benefits, these innovations have inadvertently created a new venue for terrorist activities. Examining violent extremism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Violent Extremism: Breakthroughs in Research and Practice is a critical source of academic knowledge on the social, psychological, and political aspects of radicalization and terrorist recruitment. Highlighting a range of pertinent topics such as counterterrorism, propaganda, and online activism, this publication is an ideal reference source for researchers, analysts, intelligence officers, policymakers, academicians, researchers, and graduate-level students interested in current research on violent extremism.
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2007. It covers network applications: cluster and grid computing, peer-to-peer computing; network technologies: network algorithms, network reliability and dependability; network and parallel architectures: multicore design issues, performance modeling and evaluation; and parallel and distributed software: data mining, parallel programming tools and compilers.
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
The Internet of Things (IoT) concept has emerged partly due to information and communication technology developments and societal needs, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of the IoT ecosystem. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. This book also includes a collection of research works covering key emerging trends in IoT security and privacy t...
This two-volume set of LNAI 12798 and 12799 constitutes the thoroughly refereed proceedings of the 34th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2021, held virtually and in Kuala Lumpur, Malaysia, in July 2021. The 87 full papers and 19 short papers presented were carefully reviewed and selected from 145 submissions. The IEA/AIE 2021 conference will continue the tradition of emphasizing on applications of applied intelligent systems to solve real-life problems in all areas. These areas include the following: Part I, Artificial Intelligence Practices: Knowledge discovery and pattern mining; artificial intelligence and m...
Proceedings of the International Conference on Human-centric Computing and Embedded and Multimedia Computing (HumanCom & EMC 2011) will cover topics of HumanCom and EMC, the current hot topics satisfying the world-wide ever-changing needs. Human-centric computing is to create novel solutions so that the humans are always connected, portable, and available. As with pervasive-computing, human-centric computing requires a variety of devices; however, such devices exist simply to obtain inputs from the human and are embedded in objects that humans interact with on a daily basis. Moreover, during the past couple of decades, Information Science technologies influenced and changed every aspect of o...