You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
How should a free society protect privacy? Dramatic changes in national security law and surveillance, as well as technological changes from social media to smart cities mean that our ideas about privacy and its protection are being challenged like never before. In this interdisciplinary book, Chris Berg explores what classical liberal approaches to privacy can bring to current debates about surveillance, encryption and new financial technologies. Ultimately, he argues that the principles of classical liberalism – the rule of law, individual rights, property and entrepreneurial evolution – can help extend as well as critique contemporary philosophical theories of privacy.
This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, access control, and digital rights management, malware and intrusion detection, as well as surveillance and crisis management.
With our ever-increasing reliance on computer technology in every field of modern life, the need for continuously evolving and improving cyber security remains a constant imperative. This book presents the 3 keynote speeches and 10 papers delivered at the 2nd Singapore Cyber Security R&D Conference (SG-CRC 2017), held in Singapore, on 21-22 February 2017. SG-CRC 2017 focuses on the latest research into the techniques and methodologies of cyber security. The goal is to construct systems which are resistant to cyber-attack, enabling the construction of safe execution environments and improving the security of both hardware and software by means of mathematical tools and engineering approaches for the design, verification and monitoring of cyber-physical systems. Covering subjects which range from messaging in the public cloud and the use of scholarly digital libraries as a platform for malware distribution, to low-dimensional bigram analysis for mobile data fragment classification, this book will be of interest to all those whose business it is to improve cyber security.
This book provides a comprehensive analysis of the tools and techniques used today for designing and modeling of efficient and robust swarm-intelligence based systems: highly (or fully) decentralized, semi-autonomous, highly-scalable infrastructures in various real-life scenarios. Among others, the book reviews the use of the swarm intelligence paradigm in financial investment, blockchain protocols design, shared transportation systems, communication networks, bioinformatics, and military applications. Theoretical and practical limitations of such systems, as well as trade-offs between the various economic and operational parameters of the systems, are discussed. The book is intended for researchers and engineers in the fields of swarm systems, economics, agriculture, nutrition, and operation research.
NGITS2002 was the ?fth workshop of its kind, promoting papers that discuss new technologies in information systems. Following the success of the four p- vious workshops (1993, 1995, 1997, and 1999), the ?fth NGITS Workshop took place on June 24–25, 2002, in the ancient city of Caesarea. In response to the Call for Papers, 22 papers were submitted. Each paper was evaluated by three Program Committee members. We accepted 11 papers from 3 continents and 5 countries, Israel (5 papers), US (3 papers), Germany, Cyprus, and The Netherlands (1 paper from each). The workshop program consisted of ?ve paper sessions, two keynote lectures, and one panel discussion. The topics of the paper sessions are: Advanced Query Processing, Web Applications, Moving Objects, Advanced Information Models, and Advanced Software Engineering. We would like to thank all the authors who submitted papers, the program committee members, the presenters, and everybody who assisted in making NGITS2002 a reality.
This review volume introduces the novel intelligent Web theory called computational Web intelligence (CWI) based on computational intelligence (CI) and Web technology (WT). It takes an in-depth look at hybrid Web intelligence (HWI), which is based on artificial biological and computational intelligence with Web technology and is used to build hybrid intelligent Web systems that serve wired and wireless users more efficiently. The basic principles of CWI and various e-applications of CWI and HWI are discussed. For completeness, six major CWI techniques — fuzzy Web intelligence, neural Web intelligence, evolutionary Web intelligence, granular Web intelligence, rough Web Intelligence and probabilistic Web intelligence — are described. With the huge potential for intelligent e-business applications of CWI and HWI, these techniques represent the future of intelligent Web applications.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2009, held in Bangkok, Thailand, in April 2009. The 10 revised full papers, 7 revised short papers together with 1 keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis enterprise risk management emergency response and surveillance information access and security, as well as data and text mining.
This book constitutes the thoroughly refereed proceedings of the 30th Annual German Conference on Artificial Intelligence, KI 2007, held in Osnabrück, Germany, September 2007. The papers are organized in topical sections on cognition and emotion, semantic Web, analogy, natural language, reasoning, ontologies, spatio-temporal reasoning, machine learning, spatial reasoning, robot learning, classical AI problems, and agents.