|
Books > Computing & IT > Computer communications & networking
This handbook covers recent advances in the integration of three
areas, namely, cloud computing, cyber-physical systems, and the
Internet of things which is expected to have a tremendous impact on
our daily lives. It contains a total of thirteen peer-reviewed and
edited chapters. This book covers topics such as context-aware
cyber-physical systems, sustainable cloud computing, fog computing,
and cloud monitoring; both the theoretical and practical aspects
belonging to these topics are discussed. All the chapters also
discuss open research challenges in the areas mentioned above.
Finally, the handbook presents three use cases regarding
healthcare, smart buildings and disaster management to assist the
audience in understanding how to develop next-generation IoT- and
cloud-enabled cyber-physical systems. This timely handbook is
edited for students, researchers, as well as professionals who are
interested in the rapidly growing fields of cloud computing,
cyber-physical systems, and the Internet of things.
In recent years, the surge of blockchain technology has been rising
due to is proven reliability in ensuring secure and effective
transactions, even between untrusted parties. Its application is
broad and covers public and private domains varying from
traditional communication networks to more modern networks like the
internet of things and the internet of energy crossing fog and edge
computing, among others. As technology matures and its standard use
cases are established, there is a need to gather recent research
that can shed light on several aspects and facts on the use of
blockchain technology in different fields of interest. Enabling
Blockchain Technology for Secure Networking and Communications
consolidates the recent research initiatives directed towards
exploiting the advantages of blockchain technology for benefiting
several areas of applications that vary from security and
robustness to scalability and privacy-preserving and more. The
chapters explore the current applications of blockchain for
networking and communications, the future potentials of blockchain
technology, and some not-yet-prospected areas of research and its
application. This book is ideal for practitioners, stakeholders,
researchers, academicians, and students interested in the concepts
of blockchain technology and the potential and pitfalls of its
application in different utilization domains.
Dynamic, trustworthy and reliable service delivery in Service
Oriented Architectures (SOA) is one of the main preconditions for
successful and sustainable business operations. Service and
business process reliability is, therefore, of paramount importance
and cannot be compromised. Engineering Reliable Service Oriented
Architecture: Managing Complexity and Service Level Agreements
presents a guide to engineering reliable SOA systems and enhances
current understanding of service reliability. It is an essential
reference for both practitioners and researchers wishing to explore
state-of-the art results from the field of reliable SOA application
engineering.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
Privacy protection within large databases can be a challenge. By
examining the current problems and challenges this domain is
facing, more efficient strategies can be established to safeguard
personal information against invasive pressures. HCI Challenges and
Privacy Preservation in Big Data Security is an informative
scholarly publication that discusses how human-computer interaction
impacts privacy and security in almost all sectors of modern life.
Featuring relevant topics such as large scale security data, threat
detection, big data encryption, and identity management, this
reference source is ideal for academicians, researchers,
advanced-level students, and engineers that are interested in
staying current on the advancements and drawbacks of human-computer
interaction within the world of big data.
The growth of innovative cyber threats, many based on
metamorphosing techniques, has led to security breaches and the
exposure of critical information in sites that were thought to be
impenetrable. The consequences of these hacking actions were,
inevitably, privacy violation, data corruption, or information
leaking. Machine learning and data mining techniques have
significant applications in the domains of privacy protection and
cybersecurity, including intrusion detection, authentication, and
website defacement detection, that can help to combat these
breaches. Applications of Machine Learning and Deep Learning for
Privacy and Cybersecurity provides machine and deep learning
methods for analysis and characterization of events regarding
privacy and anomaly detection as well as for establishing
predictive models for cyber attacks or privacy violations. It
provides case studies of the use of these techniques and discusses
the expected future developments on privacy and cybersecurity
applications. Covering topics such as behavior-based
authentication, machine learning attacks, and privacy preservation,
this book is a crucial resource for IT specialists, computer
engineers, industry professionals, privacy specialists, security
professionals, consultants, researchers, academicians, and students
and educators of higher education.
Cybersecurity threats have become ubiquitous and continue to topple
every facet of the digital realm as they are a problem for anyone
with a gadget or hardware device. However, there are some actions
and safeguards that can assist in avoiding these threats and
challenges; further study must be done to ensure businesses and
users are aware of the current best practices. Cybersecurity
Issues, Challenges, and Solutions in the Business World considers
cybersecurity innovation alongside the methods and strategies for
its joining with the business industry and discusses pertinent
application zones such as smart city, e-social insurance, shrewd
travel, and more. Covering key topics such as blockchain, data
mining, privacy, security issues, and social media, this reference
work is ideal for security analysts, forensics experts, business
owners, computer scientists, policymakers, industry professionals,
researchers, scholars, academicians, practitioners, instructors,
and students.
Technology trends may come and go, but cloud computing technologies
have been gaining consideration in the commercial world due to its
ability to provide on-demand access to resources, control the
software environment, and supplement existing systems. Pervasive
Cloud Computing Technologies: Future Outlooks and Interdisciplinary
Perspectives explores the latest innovations with cloud computing
and the impact of these new models and technologies. This book will
present case studies and research on the future of cloud computing
technologies and its ability to increase connectivity of various
entities of the world. It is an essential resource for technology
practitioners, engineers, managers, and academics aiming to gain
the knowledge of these novel and pervasive technologies.
Recent technology trends involving the combination of mobile
networks and cloud computing have offered new chances for mobile
network providers to use specific carrier-cloud services. These
advancements will enhance the utilization of the mobile cloud in
industry and corporate settings. Mobile Networks and Cloud
Computing Convergence for Progressive Services and Applications is
a fundamental source for the advancement of knowledge, application,
and practice in the interdisciplinary areas of mobile network and
cloud computing. By addressing innovative concepts and critical
issues, this book is essential for researchers, practitioners, and
students interested in the emerging field of vehicular wireless
networks.
Recently, the event-based paradigm, a burgeoning technology
receiving attention in research as well as industry, has gained
momentum in the commercial world causing a need for further
research in the field. Principles and Applications of Distributed
Event-Based Systems showcases event-based systems in real-world
applications, providing an overview of relevant terminology and
content approachable for readers from a variety of backgrounds.
Containing expert international contributions, this advanced
publication provides professionals, researchers, and students in
systems design with a rich compendium of latest applications in the
field.
This book presents architectural solutions of wireless network and
its variations. It basically deals with modeling, analysis, design
and enhancement of different architectural parts of wireless
network. The main aim of this book is to enhance the applications
of wireless network by reducing and controlling its architectural
issues. The book discusses efficiency and robustness of wireless
network as a platform for communication and data transmission and
also discusses some challenges and security issues such as limited
hardware resources, unreliable communication, dynamic topology of
some wireless networks, vulnerability and unsecure environment.
This book is edited for users, academicians and researchers of
wireless network. Broadly, topics include modeling of security
enhancements, optimization model for network lifetime, modeling of
aggregation systems and analyzing of troubleshooting techniques.
In its 8th edition the SAFE conference continues to publish
important research contributing to the development of the field.
The papers included in this volume are the work of engineers,
scientists, field researchers, managers and other specialists
involved in one or more of the theoretical and practical aspects of
safety and security. Safety and Security Engineering, due to its
special nature, is an interdisciplinary area of research and
application that brings together in a systematic way, many
disciplines of engineering, from the traditional to the most
technologically advanced. This volume covers topics such as crisis
management, security engineering, natural and man-made disasters
and emergencies, risk management, and control, protection and
mitigation issues. Specific themes include: Risk analysis,
assessment and management; System safety engineering; Incident
monitoring; Information and communication security; Disaster
management; Emergency response; Critical infrastructure protection;
Counter terrorism issues; Human factors; Transportation safety and
security; Modelling and experiments; Security surveillance systems;
Loss prevention; BIM in Safety and Security.
Certification and Security in Health-Related Web Applications:
Concepts and Solutions aims to bridge the worlds of healthcare and
information technology, increase the security awareness of
professionals, students and users and highlight the recent advances
in certification and security in health-related Web applications.
This book features selected papers presented at the 3rd
International Conference on Wireless Communications and
Applications (ICWCA 2019), held at Hainan University, China.
Focusing on applications of the latest smart theories and
approaches, and recent advances in the field, it covers topics such
as OFDM and multi-carrier techniques; smart antenna and space-time
signal processing; MIMO, multi-user MIMO, and massive MIMO;
modulation, coding, and diversity techniques; dynamic spectrum
access and cognitive radio; interference management and radio
resource allocation; equalization techniques; synchronization,
estimation, and detection techniques; and wireless multiple access
(e.g. CDMA, OFDMA, NOMA, ).
In this day of frequent acquisitions and perpetual application
integrations, systems are often an amalgamation of multiple
programming languages and runtime platforms using new and legacy
content. Systems of such mixed origins are increasingly vulnerable
to defects and subversion.
System Assurance: Beyond Detecting Vulnerabilities addresses
these critical issues. As a practical resource for security
analysts and engineers tasked with system assurance, the book
teaches you how to use the Object Management Group s (OMG)
expertise and unique standards to obtain accurate knowledge about
your existing software and compose objective metrics for system
assurance. OMG s Assurance Ecosystem provides a common framework
for discovering, integrating, analyzing, and distributing facts
about your existing enterprise software. Its foundation is the
standard protocol for exchanging system facts, defined as the OMG
Knowledge Discovery Metamodel (KDM). In addition, the Semantics of
Business Vocabularies and Business Rules (SBVR) defines a standard
protocol for exchanging security policy rules and assurance
patterns. Using these standards together, you will learn how to
leverage the knowledge of the cybersecurity community and bring
automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and
affordable System Assurance.Includes an overview of OMG Software
Assurance Ecosystem protocols that integrate risk, architecture and
code analysis guided by the assurance argument.Case Study
illustrating the steps of the System Assurance Methodology using
automated tools."
This book addresses 5G network capacity requirements with a new
architecture for 5G Optical Backhaul Network. The author first
describes the challenges for 5G backhaul network requirements and
then the details of an Optical Backhaul Network for 5G. The author
describes an architecture, in which small cells deploy as a cluster
(i.e., 3-5 small cells in one cluster), where one small cell works
as an aggregation point using an optical transceiver to backhaul
the aggregated traffic to the nearest optical network unit, before
it then goes to the core network. This book also illustrates the
optical link budget analysis that can be used to determine the
availability and the performances of the optical backhaul link in
different deployment scenarios and different weather conditions.
Provides a single-source reference to the basics of free space
laser communication with ambient light compensation; Offers timely
information, blending theory and practice; Written to be accessible
to readers with varying backgrounds, including numerous
illustrations; Provides hands-on experience through practical
examples, which can be put to work to deploy and optimize cellular
networks.
Hash functions are the cryptographer's Swiss Army knife. Even
though they play an integral part in today's cryptography, existing
textbooks discuss hash functions only in passing and instead often
put an emphasis on other primitives like encryption schemes. In
this book the authors take a different approach and place hash
functions at the center. The result is not only an introduction to
the theory of hash functions and the random oracle model but a
comprehensive introduction to modern cryptography. After motivating
their unique approach, in the first chapter the authors introduce
the concepts from computability theory, probability theory,
information theory, complexity theory, and information-theoretic
security that are required to understand the book content. In Part
I they introduce the foundations of hash functions and modern
cryptography. They cover a number of schemes, concepts, and proof
techniques, including computational security, one-way functions,
pseudorandomness and pseudorandom functions, game-based proofs,
message authentication codes, encryption schemes, signature
schemes, and collision-resistant (hash) functions. In Part II the
authors explain the random oracle model, proof techniques used with
random oracles, random oracle constructions, and examples of
real-world random oracle schemes. They also address the limitations
of random oracles and the random oracle controversy, the fact that
uninstantiable schemes exist which are provably secure in the
random oracle model but which become insecure with any real-world
hash function. Finally in Part III the authors focus on
constructions of hash functions. This includes a treatment of
iterative hash functions and generic attacks against hash
functions, constructions of hash functions based on block ciphers
and number-theoretic assumptions, a discussion of privately keyed
hash functions including a full security proof for HMAC, and a
presentation of real-world hash functions. The text is supported
with exercises, notes, references, and pointers to further reading,
and it is a suitable textbook for undergraduate and graduate
students, and researchers of cryptology and information security.
 |
Advances in Production Management Systems. Towards Smart and Digital Manufacturing
- IFIP WG 5.7 International Conference, APMS 2020, Novi Sad, Serbia, August 30 - September 3, 2020, Proceedings, Part II
(Hardcover, 1st ed. 2020)
Bojan Lalic, Vidosav Majstorovic, Ugljesa Marjanovic, Gregor von Cieminski, David Romero
|
R3,052
Discovery Miles 30 520
|
Ships in 10 - 15 working days
|
|
The two-volume set IFIP AICT 591 and 592 constitutes the refereed
proceedings of the International IFIP WG 5.7 Conference on Advances
in Production Management Systems, APMS 2020, held in Novi Sad,
Serbia, in August/September 2020. The 164 papers presented were
carefully reviewed and selected from 199 submissions. They discuss
globally pressing issues in smart manufacturing, operations
management, supply chain management, and Industry 4.0. The papers
are organized in the following topical sections: Part I: advanced
modelling, simulation and data analytics in production and supply
networks; advanced, digital and smart manufacturing; digital and
virtual quality management systems; cloud-manufacturing;
cyber-physical production systems and digital twins; IIOT
interoperability; supply chain planning and optimization; digital
and smart supply chain management; intelligent logistics networks
management; artificial intelligence and blockchain technologies in
logistics and DSN; novel production planning and control
approaches; machine learning and artificial intelligence;
connected, smart factories of the future; manufacturing systems
engineering: agile, flexible, reconfigurable; digital assistance
systems: augmented reality and virtual reality; circular products
design and engineering; circular, green, sustainable manufacturing;
environmental and social lifecycle assessments; socio-cultural
aspects in production systems; data-driven manufacturing and
services operations management; product-service systems in DSN; and
collaborative design and engineering Part II: the Operator 4.0: new
physical and cognitive evolutionary paths; digital transformation
approaches in production management; digital transformation for
more sustainable supply chains; data-driven applications in smart
manufacturing and logistics systems; data-driven services:
characteristics, trends and applications; the future of lean
thinking and practice; digital lean manufacturing and its emerging
practices; new reconfigurable, flexible or agile production systems
in the era of industry 4.0; operations management in
engineer-to-order manufacturing; production management in food
supply chains; gastronomic service system design; product and asset
life cycle management in the circular economy; and production
ramp-up strategies for product
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
In the ever-evolving telecommunication industry, technological
improvements alone are not able to keep up with the significant
growth of mobile broadband traffic. As such, new research on
communications networks is necessary to keep up with rising demand.
Convergence of Broadband, Broadcast, and Cellular Network
Technologies addresses the problems of broadband, broadcast, and
cellular coexistence, including the increasing number of advanced
mobile users and their bandwidth demands. This book will serve as a
link between academia and industry, serving students, researchers,
and industry professionals.
|
|