You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.
This book constitutes the refereed proceedings of the 33rd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2021, which was supposed to be held in London, UK, but was held virtually due to the COVID-19 pandemic. The 10 regular papers and 7 short papers presented were carefully reviewed and selected from 36 submissions. Additionally, the volume includes 6 project reports. The papers are divided into the following topical subheadings: Finite State Machine-based Testing; Test Generation and Selection; AI-based Techniques; Use Cases; Project Reports.
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.
This book constitutes the proceedings of the 20th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2021, held in Ełk, Poland, September 24–26, 2021. The 38 papers presented together with 1 invited speech and 3 abstracts of keynotes were carefully reviewed and selected from 69 submissions. The main topics covered by the chapters in this book are mobile and pervasive computing, machine learning, high performance computing, image processing, industrial management. Additionally, the reader will find interesting papers on computer information systems, biometrics, security systems, and sensor network service. The contributions are organized ...
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...
This book constitutes the refereed proceedings of the 14th International Conference on the Quality of Information and Communications Technology, QUATIC 2021, held in Algarve, Portugal*, in September 2021. The 30 full papers and 9 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections: ICT verification and validation; software evolution; process modeling, improvement and assessment; quality aspects in quantum computing; safety, security, and privacy; quality aspects in machine learning, AI and data analytics; evidence-based software quality engineering; quality in cyber-physical systems; software quality education and training. *The conference was held virtually due to the COVID-19 pandemic.
This book gathers the best papers presented at the Fourth Italian National Conference on Sensors, held in Catania, Italy, from 21 to 23 February 2018. The book represents an invaluable and up-to-the-minute tool, providing an essential overview of recent findings, strategies and new directions in the area of sensor research. Further, it addresses various aspects based on the development of new chemical, physical or biological sensors, assembling and characterization, signal treatment and data handling. Lastly, the book applies electrochemical, optical and other detection strategies to relevant issues in the food and clinical environmental areas, as well as industry-oriented applications.
Constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. This book includes the papers that are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, and risk and hazard analysis.
This book constitutes the refereed proceedings of the 15th International Conference on the Quality of Information and Communications Technology, QUATIC 2022, held in Talavera de la Reina, Spain, in September 2022. The 18 full papers and 3 short papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections: smart and advanced systems; verification and validation; skills and education; industrial experiences and applications; safety, security and privacy.