|
Showing 1 - 10 of
10 matches in All Departments
|
Security and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings (1st ed. 2023)
Budi Arief, Anna Monreale, Michael Sirivianos, Shujun Li
|
R1,548
Discovery Miles 15 480
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the 9th International
Symposium on Security and Privacy in Social Networks and Big Data,
SocialSec 2023, which took place in Canterbury, UK, in August 2023.
The 10 full papers and 4 short papers presented in this volume were
carefully reviewed and selected from 29 submissions. They were
organized in topical sections as follows: information abuse and
political discourse; attacks; social structure and community; and
security and privacy matters. Papers "Data Reconstruction Attack
Against Principal Component Analysis" and "Edge local Differential
Privacy for Dynamic Graphs" are published Open Access under the CC
BY 4.0 License.
|
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
|
R3,295
Discovery Miles 32 950
|
Ships in 10 - 15 working days
|
This two-volume set LNICST 398 and 399 constitutes the
post-conference proceedings of the 17th International Conference on
Security and Privacy in Communication Networks, SecureComm 2021,
held in September 2021. Due to COVID-19 pandemic the conference was
held virtually. The 56 full papers were carefully reviewed and
selected from 143 submissions. The papers focus on the latest
scientific research results in security and privacy in wired,
mobile, hybrid and ad hoc networks, in IoT technologies, in
cyber-physical systems, in next-generation communication systems in
web and systems security and in pervasive and ubiquitous computing.
|
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Herve Debar, Moti Yung
|
R3,037
Discovery Miles 30 370
|
Ships in 10 - 15 working days
|
This two-volume set LNICST 398 and 399 constitutes the
post-conference proceedings of the 17th International Conference on
Security and Privacy in Communication Networks, SecureComm 2021,
held in September 2021. Due to COVID-19 pandemic the conference was
held virtually. The 56 full papers were carefully reviewed and
selected from 143 submissions. The papers focus on the latest
scientific research results in security and privacy in wired,
mobile, hybrid and ad hoc networks, in IoT technologies, in
cyber-physical systems, in next-generation communication systems in
web and systems security and in pervasive and ubiquitous computing.
This book provides an introduction to software-defined radio and
cognitive radio, along with methodologies for applying knowledge
representation, semantic web, logic reasoning and artificial
intelligence to cognitive radio, enabling autonomous adaptation and
flexible signaling. Readers from the wireless communications and
software-defined radio communities will use this book as a
reference to extend software-defined radio to cognitive radio,
using the semantic technology described.
This book provides an introduction to software-defined radio and
cognitive radio, along with methodologies for applying knowledge
representation, semantic web, logic reasoning and artificial
intelligence to cognitive radio, enabling autonomous adaptation and
flexible signaling. Readers from the wireless communications and
software-defined radio communities will use this book as a
reference to extend software-defined radio to cognitive radio,
using the semantic technology described.
This book constitutes the refereed proceedings of the 17th
International Conference on Network and System Security, NSS 2023,
held in Canterbury, UK, August 14–16, 2023.The 12 full and 9
short papers presented together with 2 invited talks in this book
were carefully reviewed and selected from 64 submissions. They
focus on Attacks and Malware, Blockchain, Security through
Hardware, Machine learning and much more.
|
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
|
R3,072
Discovery Miles 30 720
|
Ships in 10 - 15 working days
|
This LNCS 13407 constitutes the refereed proceedings of the 24th
International Conference on Information and Communications
Security, ICICS 2022, held in Canterbury, UK,, in September 2022.
The 34 revised full papers presented in the book were carefully
selected from 150 submissions The papers are organized around the
following topics: Cryptography, Authentication, Privacy and
Anonymity, Attacks and Vulnerability Analysis, Artificial
Intelligence for Detection, and Network Security and Forensics.
|
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
|
R1,577
Discovery Miles 15 770
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the Interdisciplinary Workshop on Trust, Identity, Privacy, and
Security in the Digital Economy, DETIPS 2020; the First
International Workshop on Dependability and Safety of Emerging
Cloud and Fog Systems, DeSECSys 2020; Third International Workshop
on Multimedia Privacy and Security, MPS 2020; and the Second
Workshop on Security, Privacy, Organizations, and Systems
Engineering, SPOSE 2020; held in Guildford, UK, in September 2020,
in conjunction with the 25th European Symposium on Research in
Computer Security, ESORICS 2020. A total of 42 papers was
submitted. For the DETIPS Workshop 8 regular papers were selected
for presentation. Topics of interest address various aspect of the
core areas in relation to digital economy. For the DeSECSys
Workshop 4 regular papers are included. The workshop had the
objective of fostering collaboration and discussion among
cyber-security researchers and practitioners to discuss the various
facets and trade-o s of cyber security. In particular,
applications, opportunities and possible shortcomings of novel
security technologies and their integration in emerging application
domains. For the MPS Workshop 4 regular papers are presented which
cover topics related to the security and privacy of multimedia
systems of Internet-based video conferencing systems (e.g., Zoom,
Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as
well as other services to support telework capabilities. For the
SPOSE Workshop 3 full papers were accepted for publication. They
reflect the discussion, exchange, and development of ideas and
questions regarding the design and engineering of technical
security and privacy mechanisms with particular reference to
organizational contexts.
Cognitive models and software tools have been widely used for both
research and commercial purposes. Although they have proved very
useful, there are some limitations preventing large-scale modeling
and simulation tasks to be carried out efficiently and effectively.
In this book, we aim to provide readers with a systematic overview
of state-of-the-art cognitive modeling software tools and
applications and an introduction to a new software framework for
facilitating large-scale modeling and simulation of
human-performance tasks. The authors first review cognitive
modeling theories and then present an overview of state-of-the-art
software tools for cognitive modeling and simulation. Finally, the
book focuses on the new software framework and a research prototype
called CogTool+, including how to incorporate behavioral data such
as eye-tracking data in modeling and simulation tasks. Typical
applications of CogTool+ in HCI and cyber security are given to
demonstrate its usefulness.
Fundamental pressing principles are explained here. Pressing
requirements for different garment products and various types of
fabric are classified. Variety of pressing machinery and
accessories and their working principles are outlined. Influence
factors regarding pressing quality, productivity and cost in
garment industry are analyzed. Latest developments of pressing
equipment are described as well as established concepts and the
trend of innovation.
|
|