Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Data protection.<.>)
Загальна кiлькiсть документiв : 54
Показанi документи с 1 за 20
 1-20    21-40   41-54 
1.


   
    Mathematics and Computing [[electronic resource] :] : third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings / / ed. Giri, Debasis. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 424 p. 51 illus. - Б. ц.
    Зміст:
Security and privacy --
Design of a certicateless designated server based searchable public key encryption scheme --
On the Security of a Searchable Anonymous Attribute Based Encryption --
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities” --
Design of Secure and Efficient Electronic Payment System for Mobile Users --
A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection --
Computing --
A Note on the Optimal Immunity of Boolean Functions against Fast Algebraic Attacks --
Study of Five?Neighborhood Linear Hybrid Cellular Automata and their Synthesis --
Cache optimized solution for sparse linear system over large order finite field --
Connected Fair Domination in Graphs --
Coordinating Particle Swarm Optimization, Ant Colony Optimization and K?Opt algorithm for Traveling Salesman Problem --
FASER128 and its countermeasure --
Modelling of Aircraft’s Dynamics Using Least Square Support Vector Machine Regression --
Accommodative FAS?FMG multilevel based meshfree augmented RBF?FD method for Navier?Stokes equations in spherical geometry --
Applied Mathematics. Bessel sequences and Frames in Semi?inner product Spaces --
Finiteness of Criss?Cross Method in Complementarity Problem --
Imprecise Constrained Covering Solid Travelling Salesman Problem with Credibility --
Newton Like Line Search Method using q?Calculus --
Existence results of a generalized mixed exponential type vector variational?like inequalities. - On Approximate Solutions to One Class of Nonlinear Differential Equations --
A Davidon?Fletcher?Powell Type Quasi?Newton Method to Solve Fuzzy Optimization Problems --
Bifurcation analysis of a delayed modified Holling?Tanner predator?prey model with refuge --
Improvement of analytical solution to the inverse truly nonlinear oscillator by Extended Iterative method. - Constrained Data Visualization using Rational Bi?cubic Fractal Functions --
Electrokinetic flow in a surface corrugated microchannel --
Pure Mathematics --
Fundamental solutions to the Laplacian in plane domains bounded by ellipses --
A Nice Representation for a Link between Bernstein?Durrmeyer and Kantorovich Operators --
Construction of Fractal Bases for Spaces of Functions. – Infinite Matrices Bounded on Weighted $c_0$ Space --
Mapping properties of one class of quasielliptic operators --
$\mathcal{I}_\lambda$? Double Statistical Convergence In Topological Groups --
Superconvergence results for Volterra?Urysohn integral equations of second kind --
Derivations on Lie Ideals of Prime Gamma?Rings --
4.9 $\lambda_{d}$? Statistical convergence, $\lambda_{d}$? statistical boundedness and strong $\left( V,\lambda \right) _{d}?$summability\ in metric spaces --
On Gamma?rings with Permuting Skew Tri?derivations --
A Higher Order Implicit Method for Numerical Solution of Singular Initial Value Problems.
Рубрики: Data protection.
   Computer science—Mathematics.

   Security.

   Mathematics of Computing.

Анотація: This book constitutes the proceedings of the Third International Conference on Mathematics and Computing, ICMC 2017, held in Haldia, India, in January 2017. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics. .

Перейти: https://doi.org/10.1007/978-981-10-4642-1

Дод.точки доступу:
Giri, Debasis. \ed.\; Mohapatra, Ram N. \ed.\; Begehr, Heinrich. \ed.\; Obaidat, Mohammad S. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Medical Image Watermarking [[electronic resource] :] : techniques and Applications / / ed. Singh, Amit Kumar. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XXIV, 244 p. 82 illus., 50 illus. in color. - Б. ц.
    Зміст:
Preface --
List of Figures --
List of Tables --
List of Abbreviations --
Table of Contents --
Chapter 1: Digital image watermarking: concepts and applications --
Chapter 2: Medical image watermarking techniques: a technical survey and potential challenges --
Chapter 3: Analytical study and performance evaluation of medical image watermarking techniques --
Chapter 4: Robust and imperceptible hybrid watermarking techniques for medical images --
Chapter 5: Robust and secure multiple watermarking for medical images --
Chapter 6: Secure Spread Spectrum based multiple watermarking technique for medical images --
Chapter 7: Robust and secure multiple watermarking technique for application in tele-ophthalmology --
Chapter 8: Secure multiple watermarking technique using neural networks --
Chapter 9: Securing patient data through multiple watermarking and selective encryption --
Chapter 10: State-of-the-art techniques of image watermarking: new trends and future challenges.
Рубрики: Data protection.
   Optical data processing.

   Signal processing.

   Image processing.

   Speech processing systems.

   Health administration.

   Multimedia information systems.

   Health informatics.

   Security.

   Image Processing and Computer Vision.

   Signal, Image and Speech Processing.

   Health Administration.

   Multimedia Information Systems.

   Health Informatics.

Анотація: This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers  spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.

Перейти: https://doi.org/10.1007/978-3-319-57699-2

Дод.точки доступу:
Singh, Amit Kumar. \ed.\; Kumar, Basant. \ed.\; Singh, Ghanshyam. \ed.\; Mohan, Anand. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    Multimedia Communications, Services and Security [[electronic resource] :] : 9th International Conference, MCSS 2017, Krakow, Poland, November 16-17, 2017, Proceedings / / ed.: Dziech, Andrzej., Czyzewski, Andrzej. - 1st ed. 2017. - [S. l. : s. n.]. - X, 215 p. 93 illus. - Б. ц.
    Зміст:
Multimedia services --
Intelligent monitoring --
Audio-visual systems --
Biometric applications --
Experiments and deployments.
Рубрики: Optical data processing.
   Artificial intelligence.

   Data protection.

   Computers and civilization.

   Computers.

   Computer Imaging, Vision, Pattern Recognition and Graphics.

   Artificial Intelligence.

   Security.

   Computers and Society.

   Information Systems and Communication Service.

Анотація: This volume constitutes the refereed proceedings of the 9th International Conference on Multimedia Communications, Services and Security, MCSS 2017, held in Krakow, Poland, in November 2017. The 16 full papers included in the volume were selected from 38 submissions. The papers cover ongoing research activities in the following topics: multimedia services; intelligent monitoring; audio-visual systems; biometric applications; experiments and deployments.

Перейти: https://doi.org/10.1007/978-3-319-69911-0

Дод.точки доступу:
Dziech, Andrzej. \ed.\; Czyzewski, Andrzej. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Security and Privacy in Communication Networks [[electronic resource] :] : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings / / ed. Deng, Robert. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 781 p. 256 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Computer communication systems.

   Computers and civilization.

   Artificial intelligence.

   Systems and Data Security.

   Security.

   Cryptology.

   Computer Communication Networks.

   Computers and Society.

   Artificial Intelligence.

Анотація: This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Перейти: https://doi.org/10.1007/978-3-319-59608-2

Дод.точки доступу:
Deng, Robert. \ed.\; Weng, Jian. \ed.\; Ren, Kui. \ed.\; Yegneswaran, Vinod. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    Industrial IoT Technologies and Applications [[electronic resource] :] : second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings / / ed.: Chen, Fulong., Luo, Yonglong. - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 248 p. 131 illus. - Б. ц.
    Зміст:
Bound Analysis for Anchor Selection in Cooperative Localization --
Recharging route scheduling for wireless sensor network through particle swarm optimization --
Tracking movement target by using WebGIS on video surveillance system,- Mobile Attitude Transmission and Aircraft Control Strategies Based on WIFI --
Optimization bottleneck analysis in GPU-based aiming at SAR Imaging --
Research based on data processing technology of Industrial Internet of Things --
An Optimized Clustering Method with Improved Cluster Center for Social Network based on Gravitational Search Algorithm --
Elastic Resource Provisioning System Based on OpenStack Cloud Platform --
Edge affine invariant moment for texture image feature extraction --
Intelligent Private Fitness System based on ARM and Hybrid Internet of Things --
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprint Encryption --
Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique --
Link-based Privacy-preserving Data Aggregation Scheme in Wireless Sensor Networks --
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC --
Heterogeneous Component Model for Architecture of Community Medical Internet of Things --
A Novel Grouping-based WSN Clustering Data Transmission Protocol --
An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor Networks --
Study on Electromagnetic Scattering Characteristics of Bodies of Revolution by Compressive Sensing --
An Inside Look at IoT Malware --
Design of OPC/DDP-Based Remote Monitoring System for Environmental Protection of the IoT --
Smart home monitoring system based on SOC --
Improved One-Round Phrase Search Schemes over Symmetrically Encrypted Data in Storage Outsourcing System --
A 0.6-2.4GHz Broadband GaN HEMT Power Amplifier with 79.8% Maximum Drain Efficiency --
Dynamic research on 2-Stage Reluctance Electromagnetic Launcher --
Characteristic, Architecture, Technology, and Design Methodology of Cyber-Physical Systems.
Рубрики: Special purpose computers.
   Computer communication systems.

   Application software.

   Computer security.

   Optical data processing.

   Data protection.

   Special Purpose and Application-Based Systems.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Systems and Data Security.

   Image Processing and Computer Vision.

   Security.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security.

Перейти: https://doi.org/10.1007/978-3-319-60753-5

Дод.точки доступу:
Chen, Fulong. \ed.\; Luo, Yonglong. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Critical Infrastructure Protection XI [[electronic resource] :] : 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers / / ed.: Rice, Mason., Shenoi, Sujeet. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 338 p. 116 illus. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Management information systems.

   Computer science.

   Special purpose computers.

   Computers and civilization.

   Computer simulation.

   Systems and Data Security.

   Security.

   Management of Computing and Information Systems.

   Special Purpose and Application-Based Systems.

   Computers and Society.

   Simulation and Modeling.

Анотація: The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.  Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection.  Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.  Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security. This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection.  The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017. Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Перейти: https://doi.org/10.1007/978-3-319-70395-4

Дод.точки доступу:
Rice, Mason. \ed.\; Shenoi, Sujeet. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Trusted Computing and Information Security [[electronic resource] :] : 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings / / ed. Xu, Ming. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 410 p. 133 illus. - Б. ц.
    Зміст:
Theory of trusted computing, trustworthy software --
Infrastructure of trusted computing, application and evaluation of trusted computing --
Network security and communication security --
Theory and technology of cryptographic techniques --
Information content security --
System security for mobile network and IoT systems, industrial control and embedded systems --
Security for Cloud computing, virtualization systems and big data.
Рубрики: Computer security.
   Data encryption (Computer science).

   Data protection.

   Computer software—Reusability.

   Systems and Data Security.

   Cryptology.

   Security.

   Performance and Reliability.

Анотація: This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Перейти: https://doi.org/10.1007/978-981-10-7080-8

Дод.точки доступу:
Xu, Ming. \ed.\; Qin, Zheng. \ed.\; Yan, Fei. \ed.\; Fu, Shaojing. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Mobile Networks and Management [[electronic resource] :] : 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings / / ed. Aguero, Ramon. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - X, 229 p. 98 illus. - Б. ц.
    Зміст:
Spatial Keyword Query Processing in the Internet of Vehicles --
Recovering Request Patterns to a CPU Processor From Observed CPU Consumption Data --
Impacts of Radio Irregularity on Duty-cycled Industrial Wireless Sensor Networks --
Security Visualization: Detecting Denial Of Service --
Latency in Cascaded Wired / Wireless Communication Networks for Factory Automation --
Network Topology Exploration for Industrial Networks --
An Improved Robust Low Cost Approach for Real Time Vehicle Positioning in a Smart City --
Effect of Network Architecture Changes on OCSVM based Intrusion Detection System --
Smart Behavioral Filter for SCADA Network --
Adaptive Down-Sampling and Super-Resolution for Additional Video Compression --
Improving classification of tweets using linguistic information from a large external corpus --
Walking into Videos --
Mobile Agent Itinerary Planning Approaches in Wireless Sensor Networks- State of the Art and Current Challenges --
Mood-based On-Car Music Recommendations --
Automatic detection of hateful comments in online discussion.
Рубрики: Computer communication systems.
   Application software.

   Computer system failures.

   Data protection.

   Special purpose computers.

   Computer security.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   System Performance and Evaluation.

   Security.

   Special Purpose and Application-Based Systems.

   Systems and Data Security.

Анотація: This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016. The 14 revised full papers were carefully reviewed and selected from 18 submissions. The papers are organized thematically in four parts, starting with cloud computing and software defined networking followed by Internet-of-the-things, vehicular networks and novel techniques and algorithms.

Перейти: https://doi.org/10.1007/978-3-319-52712-3

Дод.точки доступу:
Aguero, Ramon. \ed.\; Zaki, Yasir. \ed.\; Wenning, Bernd-Ludwig. \ed.\; Forster, Anna. \ed.\; Timm-Giel, Andreas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Smart Grid Inspired Future Technologies [[electronic resource] :] : first International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papers / / ed. Hu, Jia. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 234 p. 89 illus. - Б. ц.
    Зміст:
Mobility Incorporated Vehicle-to-Grid (V2G) Optimization for Uniform Utilization in Smart Grid based Power Distribution Network --
A Cost Function based Prioritization Method for Smart Grid Communication Network --
Clustering Power Consumption Data in Smart Grid --
Using a Cost Function to Choose the Best Communication Technology for fulfilling the Smart Meters Communication Requirements --
Assessing Loss Event Frequencies of Smart Grid Cyber Threats: Encoding Flexibility into FAIR Using Bayesian Network Approach --
Replay attack impact on Advanced Metering Infrastructure (AMI) --
D2Sketch: Supporting Efficient Identification of Heavy Hitters over Sliding Windows --
Short Term Load Forecasting for Residential Buildings --
Short-Term Electrical Load Forecasting based on Fuzzy Logic Control and Improved Back Propagation Algorithm --
On the Study of Secrecy Capacity with Outdated CSI --
The Role of Analog Beamwidth in Spectral Efficiency of Millimeter Wave Ad Hoc Networks --
An ANN-based Energy Forecasting Framework for the District Level Smart Grids --
Future demand response services for blocks of buildings --
Use Cases and Business Models of Multi-Agent System (MAS) ICT Solutions for LV Flexibility Management --
Combination of Standards to Support Flexibility Management in the Smart Grid, Challenges and Opportunities --
A Load Balanced Charging Strategy for Electric Vehicle in Smart Grid --
Optimized Energy-aware Window Control --
Smart Home System Network Architecture --
Threat navigator: grouping and ranking malicious external threats to current and future urban smart grids. .
Рубрики: Computer communication systems.
   Special purpose computers.

   Application software.

   Data protection.

   Computers.

   Energy systems.

   Computer Communication Networks.

   Special Purpose and Application-Based Systems.

   Computer Applications.

   Security.

   Information Systems and Communication Service.

   Energy Systems.

Анотація: This book constitutes the post-conference proceedings of the First International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016, held in May 2016 in Liverpool, UK. Smart grid is the next generation electric grid that enables efficient, intelligent, and economical power generation, transmission, and distribution. The 25 revised full papers presented were reviewed and selected from 36 submissions. The papers cover technical topics such as high-level ideology and methodology, concrete smart grid inspired data sensing, processing, and networking technologies, smart grid system architecture, Quality of Service (QoS), energy efficiency, security in smart grid systems, management of smart grid systems, service engineering and algorithm design, and real-world deployment experiences.

Перейти: https://doi.org/10.1007/978-3-319-47729-9

Дод.точки доступу:
Hu, Jia. \ed.\; Leung, Victor C. M. \ed.\; Yang, Kun. \ed.\; Zhang, Yan. \ed.\; Gao, Jianliang. \ed.\; Yang, Shusen. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Digital Communication. Towards a Smart and Secure Future Internet [[electronic resource] :] : 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedings / / ed.: Piva, Alessandro., Tinnirello, Ilenia., Morosi, Simone. - 1st ed. 2017. - [S. l. : s. n.]. - X, 263 p. 98 illus. - Б. ц.
    Зміст:
Biometric systems --
On the use of time information at long distance in biometric online signature recognition --
Automatic Face Recognition and Identification Tools in the Forensic Science Domain --
Biometric Fusion for Palm-Vein Based Recognition Systems --
Emerging services with NFV --
Availability Modeling and Evaluation of a Network Service Deployed via NFV --
Definition and Evaluation of Cold Migration Policies for the Minimization of the Energy Consumption in NFV Architectures --
A Lightweight Prediction Method for Scalable Analytics of Multi-Seasonal KPIs --
Multimedia forensics --
A copy-move detection algorithm based on geometric local binary pattern --
A Dataset for forensic analysis of videos in the wild --
Illumination Analysis in Physics-based Image Forensics: A Joint Discussion of Illumination Direction and Color --
Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling --
Security protocols --
A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices --
Delay Tolerant Revocation Scheme in Delay Tolerant VANETs --
Impact of Spreading Factor Imperfect Orthogonality in LoRa Communications --
Software Defined Networks --
A Network-Assisted Platform for Multipoint Remote Learning --
A de-verticalizing middleware for IoT systems based on Information Centric Networking design --
Technologies for IoT --
Measuring Spectrum Similarity in Distributed Radio Monitoring Systems --
Green and Heuristics-based Consolidation Scheme for Data Center Cloud Applications --
Implementing a per-flow Token Bucket using Open Packet Processor. .
Рубрики: Computer organization.
   Optical data processing.

   Application software.

   Data protection.

   Biometrics (Biology).

   Computer Systems Organization and Communication Networks.

   Image Processing and Computer Vision.

   Information Systems Applications (incl. Internet).

   Security.

   Biometrics.

Анотація: This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017. The 18 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: biometric systems; emerging services with Network Function Virtualization (NFV); multimedia forensics; security protocols; software defined networks; and technologies for Internet of Things (IoT).

Перейти: https://doi.org/10.1007/978-3-319-67639-5

Дод.точки доступу:
Piva, Alessandro. \ed.\; Tinnirello, Ilenia. \ed.\; Morosi, Simone. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Future Network Systems and Security [[electronic resource] :] : third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings / / ed.: Doss, Robin., Piramuthu, Selwyn., Zhou, Wei. - 1st ed. 2017. - [S. l. : s. n.]. - X, 199 p. 60 illus. - Б. ц.
    Зміст:
Protocol design and secure implementation --
Security protocols and attack countermeasures --
Big data and future applications.
Рубрики: Computer communication systems.
   Application software.

   Computers and civilization.

   Data protection.

   Computer system failures.

   Computers.

   Law and legislation.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Computers and Society.

   Security.

   System Performance and Evaluation.

   Legal Aspects of Computing.

Анотація: This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications. .

Перейти: https://doi.org/10.1007/978-3-319-65548-2

Дод.точки доступу:
Doss, Robin. \ed.\; Piramuthu, Selwyn. \ed.\; Zhou, Wei. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


   
    Future Intelligent Vehicular Technologies [[electronic resource] :] : first International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised Selected Papers / / ed.: Ferreira, Joaquim., Alam, Muhammad. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 225 p. 122 illus., 67 illus. in color. - Б. ц.
    Зміст:
Enforcing Replica Determinism in the Road Side Units of Fault-Tolerant Vehicular Networks --
A Deterministic MAC Protocol for Infrastructure to Vehicle Communications in Motorways --
A proposal for an improved distributed MAC protocol for vehicular networks --
Adaptive Contention Window Design to Minimize Synchronous Collisions in 802.11p Networks --
Model Driven Architecture for Decentralized Software Defined VANETs --
Data Rate Adaptation Strategy to Avoid Packet Loss in MANETs --
Security and Applications of Vehicular Communication --
Low-Cost Vehicle Driver Assistance System for Fatigue and Distraction Detection --
Implementation of Security Services for Vehicular Communications --
Performance Evaluation of SIMO Techniques in IEEE 802.11p --
Wireless Power Transfer for Energy-Efficient Electric Vehicles --
Automatic DDoS Detection and its Mitigation with combination of OpenFlow and sFlow --
The Role of Vehicular Cloud Computing in Road Traffic Management: A Survey --
Architecture Proposal for MCloud IoT --
CoAP-based Request-Response Interaction Model for the Internet of Things --
Performance Analysis of Vehicular Adhoc Network using different Highway Traffic Scenarios in Cloud Computing --
Secure and Safe Surveillance System using Sensors Networks - Internet of Things --
Challenges and Opportunities in Big Data and Cloud Computing --
Applications and Challenges Faced By Internet of Things - A Survey --
Cloud Computing Development Life Cycle Model (CCDLC) --
Effective Use of Search Functionality inPakistan e-Government Websites --
Mealy,Moore & Markov Mathematical Modelling Machines for Big Data --
Education and Socio Economic Factors Impact on Earning for Pakistan- A Bigdata Analysis.
Рубрики: Computer communication systems.
   Application software.

   Special purpose computers.

   Data protection.

   Electrical engineering.

   Data mining.

   Computer Communication Networks.

   Information Systems Applications (incl. Internet).

   Special Purpose and Application-Based Systems.

   Security.

   Communications Engineering, Networks.

   Data Mining and Knowledge Discovery.

Анотація: This book constitutes the refereed proceedings of the First International Conference on Future Intelligent Vehicular Technologies, Future 5V 2016, held in Porto, Portugal, in September 2016. Future 5V presents vehicular networks and communications and also hosted the “Internet of Things (IoT) meets Big Data and Cloud Computing Workshop”. The 21 revised full papers presented were reviewed and selected from 38 submissions. The papers cover all aspects of intelligent vehicular communications including security and applications.

Перейти: https://doi.org/10.1007/978-3-319-51207-5

Дод.точки доступу:
Ferreira, Joaquim. \ed.\; Alam, Muhammad. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


   
    Parallel Architecture, Algorithm and Programming [[electronic resource] :] : 8th International Symposium, PAAP 2017, Haikou, China, June 17–18, 2017, Proceedings / / ed.: Chen, Guoliang., Shen, Hong., Chen, Mingrui. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 629 p. 299 illus. - Б. ц.
Рубрики: Microprocessors.
   Numerical analysis.

   Data protection.

   Computer software.

   Computer engineering.

   Processor Architectures.

   Numeric Computing.

   Security.

   Professional Computing.

   Computer Engineering.

Анотація: This book constitutes the refereed proceedings of the 8th International Symposium on Parallel Architecture, Algorithm and Programming, PAAP 2017, held in Haikou, China, in June 2017. The 50 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 192 submissions. The papers deal with research results and development activities in all aspects of parallel architectures, algorithms and programming techniques.

Перейти: https://doi.org/10.1007/978-981-10-6442-5

Дод.точки доступу:
Chen, Guoliang. \ed.\; Shen, Hong. \ed.\; Chen, Mingrui. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Resilience and Risk [[electronic resource] :] : methods and Application in Environment, Cyber and Social Domains / / ed.: Linkov, Igor., Palma-Oliveira, Jose Manuel. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 580 p. 131 illus. - Б. ц.
    Зміст:
Part 1: Introduction --
Chapter 1. An Introduction to Resilience for Critical Infrastructures (Igor Linkov) --
Part 2: Methods --
Chapter 2: Towards a generic resilience management (Ivo Haring) --
Chapter 3: Redesigning Resilient Infrastructure Research (Thomas P Seager) --
Chapter 4: Designing Resilient Systems (Scott Jackson) --
Part 3: Infrastructure --
Chapter 5: Infrastructure Resilience Assessment, Management (Hans R Heinimann) --
Chapter  6: Engineering Resilience in Critical Infrastructures (Giovanni Sansavini) --
Chapter  7: Seaport Climate Vulnerability Assessment at the Multi-Port Scale (Robert McIntosh) --
Chapter 8: Resilience of Critical Infrastructures (Paolo Trucco) --
Part 4: Social --
Chapter 9: Social Resilience and Critical Infrastructure Systems (Benjamin Trump) --
Chapter 10: Societal Resilience: From Theory to Policy and Practice (Meir Elran) --
Chapter 11: Planning Resilient Communities (Alexander Hay) --
Chapter 12: Integration of Risk and Resilience into Policy (Charles Baubion) --
Chapter 13: Realising critical infrastructure resilience (Jon Coaffee) --
Part 5: Cyber --
Chapter 14: Bridging the Gap from Cyber Security to Resilience (Paul Roege) --
Chapter 15: Cyber-Transportation Resilience (Maria Nogal) --
Chapter 16: Resilience and Fault Tolerance (Niels P. Zussblatt) --
Part 6: Applications --
Chapter  17: Building Resilience through Risk Analysis (Philip O'Neill) --
Chapter 18: Enhancing Organizational Resilience through Risk (Dalila Antunes) --
Chapter 19: Integrative Education Model for Resources (Dejan Vasovic) --
Chapter 20: Valuation of Imminence Analysis (Eugene Piechoczek) --
Chapter 21: Resilience needs in NATO Partner Countries (Ahmed A Hady) --
Chapter 22: Contribution to Enhancement of Critical Infrastructure (Branislav Todorovic) --
Chapter 23: Risk and Resiliency Assessment of Urban Groundwater Supply Sources (Zorica Srdjevic) --
Chapter 24: Simulating Reservoir System Operation Under Given Scenarios (Bojan Srdjevic). .
Рубрики: Data protection.
   Environmental policy.

   Public safety.

   Environmental management.

   Computer security.

   System safety.

   Security.

   Environmental Policy.

   Crime Control and Security.

   Environmental Management.

   Systems and Data Security.

   Security Science and Technology.

Анотація: This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Перейти: https://doi.org/10.1007/978-94-024-1123-2

Дод.точки доступу:
Linkov, Igor. \ed.\; Palma-Oliveira, Jose Manuel. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services [[electronic resource] :] : 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings / / ed.: Katsikas, Sokratis K., Zorkadis, Vasilios. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 273 p. 58 illus. - Б. ц.
    Зміст:
E-democracy --
Privacy --
Information dissemination and freedom of expression --
Social networks --
Electronic identity authentication --
ICT in government and in the economy.
Рубрики: Computers and civilization.
   Data protection.

   Application software.

   Education—Data processing.

   Computers and Society.

   Security.

   Information Systems Applications (incl. Internet).

   Computer Appl. in Social and Behavioral Sciences.

   Computers and Education.

Анотація: This book constitutes the refereed proceedings of the 7th International Conference on E-Democracy, E-Democracy 2017, held in Athens, Greece, in December 2017. The 18 revised full papers presented were carefully selected from 44 submissions. The papers are organized in topical sections on e-democracy; privacy; information dissemination and freedom of expression; social networks; electronic identity authentication; ICT in government and in the economy.

Перейти: https://doi.org/10.1007/978-3-319-71117-1

Дод.точки доступу:
Katsikas, Sokratis K. \ed.\; Zorkadis, Vasilios. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


    Matulevicius, Raimundas.
    Fundamentals of Secure System Modelling [[electronic resource] /] : монография / Raimundas. Matulevicius ; . - 1st ed. 2017. - [S. l. : s. n.]. - XX, 218 p. 112 illus., 62 illus. in color. - Б. ц.
Рубрики: Computer security.
   Data protection.

   Software engineering.

   Management information systems.

   Systems and Data Security.

   Security.

   Software Engineering.

   Software Management.

Анотація: This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primar y target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts. “Dr. Matulevicius’ book gives a coherent account of the most important modelling-related security techniques today, and is well suited for educating the next generations of security experts.” – Prof. Andreas Lothe Opdahl, University of Bergen, Norway “Dr. Matulevicius introduces a fundamental set of knowledge for the advanced management of risk and security. Going from the conceptual aspects to practical tools, this book provides a broad coverage of the field.“ – Nicolas Mayer, Ph.D., Luxembourg Institute of Science and Technology.

Перейти: https://doi.org/10.1007/978-3-319-61717-6

Дод.точки доступу:
Matulevicius, Raimundas. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Smart Cards, Tokens, Security and Applications [[electronic resource] /] : монография / ed.: Mayes, Keith., Markantonakis, Konstantinos. - 2nd ed. 2017. - [S. l. : s. n.]. - XXXV, 531 p. 180 illus. - Б. ц.
    Зміст:
An Introduction to Smart Cards --
Smart Card Production Environment --
Multi Application Smart Card Platforms and Operating Systems --
Smart Cards and Security for Mobile Communications --
Smart Cards for Banking and Finance --
Security for Video Broadcasting --
Introduction to the TPM --
Common Criteria --
Smart Card Security --
Application Development Environments for Java and SIM Toolkit --
OTA and Secure SIM Lifecycle Management --
Smart Card Reader and Mobile APIs --
RFID and Contactless Technology --
ID Cards and Passports --
Smart Card Technology Trends --
Securing the Internet of Things --
MULTOS and MULTOS Application Development --
Trusted Execution Environment and Host Card Emulation.
Рубрики: Data structures (Computer science).
   Computer security.

   Data protection.

   Computer communication systems.

   Data Structures and Information Theory.

   Systems and Data Security.

   Security.

   Computer Communication Networks.

Анотація: This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. .

Перейти: https://doi.org/10.1007/978-3-319-50500-8

Дод.точки доступу:
Mayes, Keith. \ed.\; Markantonakis, Konstantinos. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Trust Management XI [[electronic resource] :] : 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings / / ed.: Steghofer, Jan-Philipp., Esfandiari, Babak. - 1st ed. 2017. - [S. l. : s. n.]. - X, 229 p. 32 illus. - Б. ц.
Рубрики: Computers and civilization.
   Data protection.

   Information storage and retrieval.

   E-commerce.

   Software engineering.

   Computer security.

   Computers and Society.

   Security.

   Information Storage and Retrieval.

   e-Commerce/e-business.

   Software Engineering.

   Systems and Data Security.

Анотація: This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations. .

Перейти: https://doi.org/10.1007/978-3-319-59171-1

Дод.точки доступу:
Steghofer, Jan-Philipp. \ed.\; Esfandiari, Babak. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


   
    E-Technologies: Embracing the Internet of Things [[electronic resource] :] : 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings / / ed.: Aimeur, Esma., Ruhi, Umar., Weiss, Michael. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 319 p. 80 illus. - Б. ц.
    Зміст:
Pervasive Computing and Smart Applications. -Acting as a Trustee for Internet of Agents in the Absence of Explicit Feedback --
Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments --
Privacy Preserving Discovery of Nearby-Friends --
AHL: Model-Driven Engineering of BLE Android Applications --
Security, Privacy and Trust --
Insider threat likelihood assessment for access control systems.-Compliance Verification Algorithm for Computer Systems Security Policies. -Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution --
A supervised approach for spam detection using text-based semantic representation. - Process Modeling and Adaptation --
Activity-based Process Integration in Healthcare with the User Requirements Notation. -A Business Process Re-Engineering Approach to Transform BPMN Models to Software Artifacts. -Evaluating the Potential of Technology in Justice Systems Using Goal Modeling. - Data Analytics and Machine Learning --
An OLAP Rule Environment for Reactive Performance Monitoring. - Supervised Methods to Support Online Triage of Scientific Data --
A new Scalable and Performance-enhancing bootstrap Aggregating Scheme for variables selection Taking Real-World Web Services resources as a case. - Toward an adaptive learning framework for MOOCs. - E-Health and E-Commerce. -A Virtual Patient Navigation Application for Lung Cancer Assessment Patients --
Responsiveness to Persuasive Strategies at the Workplace: A Case Study. -E-payment plan: A Conditional Multi Payment Scheme based on User Personalization and Plan Agreement. - Reflex-SMAS, a Complex Adaptive System: An Empirical Evaluation.
Рубрики: Application software.
   E-business.

   Electronic commerce.

   E-commerce.

   Health informatics.

   Management information systems.

   Data protection.

   Information Systems Applications (incl. Internet).

   e-Business/e-Commerce.

   Computer Appl. in Administrative Data Processing.

   Health Informatics.

   Business Information Systems.

   Security.

Анотація: This book constitutes the refereed proceedings of the 7th International Conference on E-Technologies, MCETECH 2017, held in Ottawa, ON, Canada, in May 2017. This year’s conference drew special attention to the ever-increasing role of the Internet of Things (IoT); and the contributions span a variety of application domains such as e-Commerce, e-Health, e-Learning, and e-Justice, comprising research from models and architectures, methodology proposals, prototype implementations, and empirical validation of theoretical models. The 19 papers presented were carefully reviewed and selected from 48 submissions. They were organized in topical sections named: pervasive computing and smart applications; security, privacy and trust; process modeling and adaptation; data analytics and machine learning; and e-health and e-commerce. .

Перейти: https://doi.org/10.1007/978-3-319-59041-7

Дод.точки доступу:
Aimeur, Esma. \ed.\; Ruhi, Umar. \ed.\; Weiss, Michael. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Ad Hoc Networks [[electronic resource] :] : 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers / / ed.: Zhou, Yifeng., Kunz, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 416 p. 176 illus. - Б. ц.
    Зміст:
Management of Surveillance Underwater Acoustic Networks --
Relative Localization for Small Wireless Sensor Networks --
Performance Study of the IEEE 802.15.6 Slotted Aloha Mechanism With Power Control in a Multiuser Environment --
New Selection Strategies of Actor’s Substitute in DARA for Connectivity Restoration in WSANs --
Asymmetric Multi-Way Ranging for Resource-Limited Nodes --
Comparison of RPL Routing Metrics on grids UAV and Vehicular Networks --
Communication and Coordination for Drone Networks 8 Intelligent Wireless AdHoc Routing Protocol and Controller for UAV Networks --
Theoretical Analysis of Obstruction’s influence on Data Dissemination in Vehicular Networks --
Performance Analysis for Traffic-aware Utility in Vehicular Ad Hoc Networks --
Investigation and Adaptation of Signal Propagation Models for a Mixed Outdoor-Indoor Scenario Using a Flying GSM Base Station Modelling and Analysis --
Optimizing Power Allocation in Wireless Networks: Are the Implicit Constraints Really Redundant? --
Towards Dynamic Capacity Management for the Masses --
Distance Distributions in Finite Ad Hoc Networks: Approaches, Applications, and Directions --
Towards More Realistic Network Simulations: Leveraging the System-Call Barrier --
16 Resource Allocation for Relay-aided Cooperative Hospital Wireless Networks --
Improving the performance of challenged networks with controlled mobility --
SDN Coordination for CCN and FC Content Dissemination --
A Bandwidth Adaptation Scheme for Cloud Radio Access Networks --
Cooperative On-the-Fly Decision Making in Mobility-Controlled Multi Ferry Delay Tolerant Networks --
Multipath Routing Optimization with Interference Consideration in Wireless Ad hoc Network --
An Accurate Passive RFID Indoor Localization System based on SenseaTag and Zoning Algorithm Workshop on practical ad hoc network security and vulnerability --
Communication Links Vulnerability Model for Cyber Security Mitigation --
Entropy-Based Recommendation Trust Model for Machine to Machine Communications --
Reliability, Throughput and Latency Analysis of an Aerial Network --
Gender Assignment for Directional Full-Duplex FDD Nodes in a Multihop Wireless Network --
A Massive MIMO Panel Array at Ka-band with Flexible Patterns and Beam Steering Performance.
Рубрики: Computer communication systems.
   Computer security.

   Special purpose computers.

   Data protection.

   Computer simulation.

   Electrical engineering.

   Computer Communication Networks.

   Systems and Data Security.

   Special Purpose and Application-Based Systems.

   Security.

   Simulation and Modeling.

   Communications Engineering, Networks.

Анотація: This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.

Перейти: https://doi.org/10.1007/978-3-319-51204-4

Дод.точки доступу:
Zhou, Yifeng. \ed.\; Kunz, Thomas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-54 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)