You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
This volume LNCS 14361 and 14362 constitutes the refereed proceedings of the, 16th International Symposium, ISVC 2023, in October 2023, held at Lake Tahoe, NV, USA. The 42 full papers and 13 poster papers were carefully reviewed and selected from 120 submissions. A total of 25 papers were also accepted for oral presentation in special tracks from 34 submissions. The following topical sections followed as: Part 1: ST: Biomedical Image Analysis Techniques for Cancer Detection, Diagnosis and Management; Visualization; Video Analysis and Event Recognition; ST: Innovations in Computer Vision & Machine Learning for Critical & Civil Infrastructures; ST: Generalization in Visual Machine Learning; Computer Graphics; Medical Image Analysis; Biometrics; Autonomous Anomaly Detection in Images; ST: Artificial Intelligence in Aerial and Orbital Imagery; ST: Data Gathering, Curation, and Generation for Computer Vision and Robotics in Precision Agriculture. Part 2: Virtual Reality; Segmentation; Applications; Object Detection and Recognition; Deep Learning; Poster.
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96 papers presented in the two volumes were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on collaborative systems for e-sciences; context-aware processing and ubiquitous systems; data and network mining; grid and cloud computing; information and data management; intelligent agent-based systems; internet modeling and design; mobile, ad hoc and sensor network management; peer-to-peer social networks; quality of service for networked systems; semantic Web and ontologies; security and access control; signal processing and computer vision for networked systems; social networks; Web services.
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.
This book highlights recent research on bio-inspired computing and its various innovative applications in information and communication technologies. It presents 38 high-quality papers from the 10th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2019) and 9th World Congress on Information and Communication Technologies (WICT 2019), which was held at GIET University, Gunupur, India, on December 16–18, 2019. As a premier conference, IBICA–WICT brings together researchers, engineers and practitioners whose work involves bio-inspired computing, computational intelligence and their applications in information security, real-world contexts, etc. Including contributions by authors from 18 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
This book highlights the recent research on hybrid intelligent systems and their various practical applications. It presents 34 selected papers from the 18th International Conference on Hybrid Intelligent Systems (HIS 2019) and 9 papers from the 15th International Conference on Information Assurance and Security (IAS 2019), which was held at VIT Bhopal University, India, from December 10 to 12, 2019. A premier conference in the field of artificial intelligence, HIS - IAS 2019 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 20 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
This book highlights recent research on soft computing, pattern recognition and biologically inspired computing. It presents 24 selected papers from the 11th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2019) and 5 papers from the 11th World Congress on Nature and Biologically Inspired Computing (NaBIC 2019), held at Vardhaman College of Engineering, Hyderabad, India, on December 13–15, 2019. SoCPaR–NaBIC is a premier conference and brings together researchers, engineers and practitioners whose work involves soft computing and bio-inspired computing, as well as their industrial and real-world applications. Including contributions by authors from 15 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.