You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nowadays it is hard to find areas of human activity and development that have not profited from or contributed to remote sensing. Natural, physical and social activities find in remote sensing a common ground for interaction and development. This book intends to show the reader how remote sensing impacts other areas of science, technology, and human activity, by displaying a selected number of high quality contributions dealing with different remote sensing applications.
The production of biological light (ultra-weak photon emission or biophotons) within many types of cells and tissues is characteristic of an alive organism. You will begin a journey of discovery about biophotons in relationship to biological matter and about how such biophotons can be detected utilizing specialized very photon-sensitive technologies. In this book, Roeland Van Wijk provides a unified synthesis that facilitates easy entry into an exciting sub-field of biology. Light in Shaping Life encompasses the history of biophoton research, insight into how biophotons are generated, and into their involvement with life. Also included, is an overview of the potential benefits of such research to a better understanding of health and medicine. There is sequel to Light in Shaping Life available: Biophoton Technology in Energy and Vitality Diagnostics A Multi-disciplinary, Systems biology, and Biotechnology Appraoch Roeland van Wijk, Yu Yan and Eduard van Wijk Meluna, 2017 ISBN 9789081884341
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023. The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Porous Nanocomposites for Electromagnetic Interference Shielding thoroughly discusses the fabrication, processing and design parameters of advanced materials for electromagnetic pollution suppression for high-frequency electronics. The book provides readers with an understanding of the important concepts and relevant advances in the engineering of porous nanocomposites for enhanced microwave absorption and EMI shielding. Porous materials reviewed include foams and aerogels which offer a robust and lightweight solution to design and fabricate microwave absorbers that can be a potential solution to stifle electromagnetic (EM) pollution. The aim of this book is to review the recent advances in ...
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.