Описание: This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information security. The book will cover malware detection, cryptography, and intrusion detection. The book will be relevant for students in machine learning and computer security courses.
Автор: Tai-hoon Kim; Adrian Stoica; Wai-chi Fang; Thanos Название: Computer Applications for Security, Control and System Engineering ISBN: 3642352634 ISBN-13(EAN): 9783642352638 Издательство: Springer Рейтинг: Цена: 6097.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation;
Автор: Ho-won Kim; Dooho Choi Название: Information Security Applications ISBN: 3319318748 ISBN-13(EAN): 9783319318745 Издательство: Springer Рейтинг: Цена: 7806.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume werecarefully reviewed and selected from 78 submissions.
Автор: Genserik Reniers, Nima Khakzad, Pieter Van Gelder Название: Security Risk Assessment: In the Chemical and Process Industry ISBN: 3110500523 ISBN-13(EAN): 9783110500523 Издательство: Walter de Gruyter Цена: 22305.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book deals with the state-of-the-art of physical security knowledge and research in the chemical and process industries. Legislation differences between Europe and the USA are investigated, followed by an overview of the how, what and why of contemporary security risk assessment in this particular industrial sector. Innovative solutions such as attractiveness calculations and the use of game theory, advancing the present science of adversarial risk analysis, are discussed. The book further stands up for developing and employing dynamic security risk assessments, for instance based on Bayesian networks, and using OR methods to truly move security forward in the chemical and process industries.
Автор: Carlo Corsi; Fedir Sizov Название: THz and Security Applications ISBN: 9401788278 ISBN-13(EAN): 9789401788274 Издательство: Springer Рейтинг: Цена: 20123.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications.
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing for Security, Privacy, and Applications ISBN: 3030573273 ISBN-13(EAN): 9783030573270 Издательство: Springer Цена: 18294.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"
Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India
Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)
Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)
Part V: Applications of Fog/Edge Computing
12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"
G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)
Vinay Chamola (BITS Pilani, Pilani Campus,
Автор: Ranise Название: Data and Applications Security and Privacy XXX ISBN: 3319414828 ISBN-13(EAN): 9783319414829 Издательство: Springer Рейтинг: Цена: 9148.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 30th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016.
Автор: Mason Stephen Название: Applications of Cryptography and Network Security ISBN: 1632400650 ISBN-13(EAN): 9781632400659 Издательство: Неизвестно Цена: 24131.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Yongdae Kim; Heejo Lee; Adrian Perrig Название: Information Security Applications ISBN: 3319051482 ISBN-13(EAN): 9783319051482 Издательство: Springer Рейтинг: Цена: 7683.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
Описание: On 17-18 September 2019, the SPS Programme gathered at the KU Leuven University a wide number of researchers from a selection of on-going and recently closed SPS projects in the field of security-related advanced technologies for a "Cluster Workshop on Advanced Technologies".
Автор: Lingyu Wang; Basit Shafiq Название: Data and Applications Security and Privacy XXVII ISBN: 3642392555 ISBN-13(EAN): 9783642392559 Издательство: Springer Рейтинг: Цена: 6097.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing For Security, Privacy, and Applications ISBN: 3030573303 ISBN-13(EAN): 9783030573300 Издательство: Springer Рейтинг: Цена: 18294.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"