Browse Results

Showing 24,301 through 24,325 of 53,816 results

Information Fusion for Cyber-Security Analytics

by Izzat M. Alsmadi George Karabatis Ahmed Aleroud

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

Information Management and Big Data: Second Annual International Symposium, Simbig 2015, Cusco, Peru, September 2-4, 2015, And Third Annual International Symposium, Simbig 2016, Cusco, Peru, September 1-3, 2016, Revised Selected Papers (Communications In Computer And Information Science #656)

by Hugo Alatrista-Salas Juan Antonio Lossio-Ventura

This book constitutes the refereed proceedings of the 4th Annual International Symposium on Information Management and Big Data, SIMBig 2017, held in Lima, Peru, in September 2017.The 10 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers address issues such as Data Science, Big Data, Data Mining, Natural Language Processing, Text Mining, Information Retrieval, Machine Learning, Semantic Web, Ontologies, Web Mining, Knowledge Representation and Linked Open Data, Social Web and Web Science, Information Visualization.

Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25-30, 2017, Proceedings (Lecture Notes in Computer Science #10265)

by Marc Niethammer, Martin Styner, Stephen Aylward, Hongtu Zhu, Ipek Oguz, Pew-Thian Yap and Dinggang Shen

This book constitutes the proceedings of the 25th International Conference on Information Processing in Medical Imaging, IPMI 2017, held at the Appalachian State University, Boon, NC, USA, in June 2017. The 53 full papers presented in this volume were carefully reviewed and selected from 147 submissions. They were organized in topical sections named: analysis on manifolds; shape analysis; disease diagnosis/progression; brain networks an connectivity; diffusion imaging; quantitative imaging; imaging genomics; image registration; segmentation; general image analysis.

Information Retrieval

by Jirong Wen Jianyun Nie Tong Ruan Yiqun Liu Tieyun Qian

This book constitutes the refereed proceedings of the 23rd China Conference on Information Retrieval, CCIR 2017, held in Shanghai, China, in July 2017. The 21 full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections: recommendation; understanding users; NLP for IR; IR and applications; query processing and analysis.

Information Retrieval Technology: 13th Asia Information Retrieval Societies Conference, AIRS 2017, Jeju Island, South Korea, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10648)

by Won-Kyung Sung, Hanmin Jung, Shuo Xu, Krisana Chinnasarn, Kazutoshi Sumiya, Jeonghoon Lee, Zhicheng Dou, Grace Hui Yang, Young-Guk Ha and Seungbock Lee

This book constitutes the refereed proceedings of the 13th Information Retrieval Societies Conference, AIRS 2017, held in Jeju, Korea, in November 2017. The 17 full papers presented were carefully reviewed and selected from numerous submissions. The final program of AIRS 2017 is divided in the following tracks: IR Infrastructure and Systems; IR Models and Theories; Personalization and Recommendation; Data Mining for IR; and IR Evaluation.

Information Search, Integration, and Personlization: 11th International Workshop, ISIP 2016, Lyon, France, November 1–4, 2016, Revised Selected Papers (Communications in Computer and Information Science #760)

by Yuzuru Tanaka Nicolas Spyratos Jean-Marc Petit Dominique Laurent Dimitris Kotzinos

This book constitutes the revised selected papers of the 11th International Workshop on Information Search, Integration and Personalization, ISIP 2016, held in Lyon, France, in November 2016. The 8 revised full papers presented were carefully reviewed and selected from 13 papers submitted to these post-conference proceedings from 30 conference presentations. The papers are organized in topical sections on exploratory analysis, mobility data analysis, and management of large data graphs.

Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)

by Phong Q. Nguyen and Jianying Zhou

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Information Security and Cryptology – ICISC 2016

by Seokhie Hong Jong Hwan Park

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.

Information Security Applications

by Dooho Choi Sylvain Guilley

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

Information Security Education for a Global Digital Society

by Matt Bishop Lynn Futcher Natalia Miloslavskaya Marianthi Theocharidou

This book constitutes the refereed proceedings of the 10th IFIP WG 11. 8 World Conference on Security Education, WISE 10, held in Rome, Italy, in May 2017. The 14 revised papers presented were carefully reviewed and selected from 31 submissions. They represent a cross section of applicable research as well as case studies in security education and are organized in the following topical sections: information security education; teaching information security; information security awareness and culture; and training information security professionals. .

Information Security Handbook

by Darren Death

Implement information security effectively as per your organization's needs. About This Book • Learn to build your own information security framework, the best fit for your organization • Build on the concepts of threat modeling, incidence response, and security analysis • Practical use cases and best practices for information security Who This Book Is For This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you. What You Will Learn • Develop your own information security framework • Build your incident response mechanism • Discover cloud security considerations • Get to know the system development life cycle • Get your security operation center up and running • Know the various security testing types • Balance security as per your business needs • Implement information security best practices In Detail Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it's important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you'll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization's requirements. Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.

Information Security Practices

by Isaac Woungang Ahmed Awad Issa Traoré

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Information Systems: 10th SIGSAND/PLAIS EuroSymposium 2017, Gdansk, Poland, September 22, 2017, Proceedings (Lecture Notes in Business Information Processing #300)

by Stanisław Wrycza and Jacek Maślankowski

This book constitutes the refereed proceedings of the 10th SIGSAND/PLAIS EuroSymposium 2017 titled Information Systems: Research, Development, Applications, and Education, held in Gdansk and Sopot, Poland, on September 27, 2017.The objective of the EuroSymposium on Systems Analysis and Design is to promote and develop high quality research on all issues related to analysis and design (SAND). It provides a forum for SAND researchers and practitioners in Europe and beyond to interact, collaborate, and develop their field. The 10 papers presented in this volume were carefully reviewed and selected from 45 submissions.They are organized in topical sections on data analytics, Web-based information systems, and information systems development.

Information Systems: 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, Coimbra, Portugal, September 7-8, 2017, Proceedings (Lecture Notes in Business Information Processing #299)

by Marinos Themistocleous and Vincenzo Morabito

This book constitutes selected papers from the 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, held in Coimbra, Portugal, in September 2017. EMCIS is focusing on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 37 full and 16 short papers presented in this volume were carefully reviewed and selected from a total of 106 submissions. They are organized in sections on big data and Semantic Web; digital services, social media and digital collaboration; e-government; healthcare information systems; information systems security and information privacy protection; IT governance; and management and organizational issues in information systems.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II

by Adam Grzech Jerzy Świątek Zofia Wilimowska Leszek Borzemski

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part III

by Jerzy Świątek Zofia Wilimowska Leszek Borzemski Adam Grzech

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems for Crisis Response and Management in Mediterranean Countries: 4th International Conference, ISCRAM-med 2017, Xanthi, Greece, October 18-20, 2017, Proceedings (Lecture Notes in Business Information Processing #301)

by Ioannis M. Dokas, Narjès Bellamine-Ben Saoud, Julie Dugdale and Paloma Díaz

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries, ISCRAM-med 2017, held in Xanthi, Greece, in October 2017. ISCRAM-med conferences aim to enhance the collaboration and solidarity between Mediterranean countries in issues related to crisis management. They offer an outstanding opportunity to address and discuss new trends and challenges in the area of Information systems and Technologies for Crisis Response and Management (ISCRAM). The 12 full and 5 short papers presented in this volume were carefully reviewed and selected from 39 submissions. They were organized in topical sections named: social networking and big data analytics; robotic systems for crisis management; decision making in the context of crisis management; serious games and simulations; and collaboration and information sharing.

Information Systems Security

by Rudrapatna K. Shyamasundar Virendra Singh Jaideep Vaidya

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics: privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Information Technology and Computational Physics

by Piotr Kulczycki László T. Kóczy Radko Mesiar Janusz Kacprzyk

A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

Information Technology and Intelligent Transportation Systems

by Valentina Emilia Balas Lakhmi C. Jain Xiangmo Zhao

This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi'an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 participants. Each paper was under double peer reviewed by at least 3 reviewers. This proceedings are sponsored by Shaanxi Computer Society and co-sponsored by Chang'an University, Xi'an University of Technology, Northwestern Poly-technical University, CAS, Shaanxi Sirui Industries Co. , LTD.

Information Technology and Intelligent Transportation Systems

by Valentina Emilia Balas Lakhmi C. Jain Xiangmo Zhao

This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi'an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 participants. Each paper was under double peer reviewed by at least 3 reviewers. This proceedings are sponsored by Shaanxi Computer Society and co-sponsored by Chang'an University, Xi'an University of Technology, Northwestern Poly-technical University, CAS, Shaanxi Sirui Industries Co. , LTD.

Information Technology for Management: New Ideas and Real Solutions

by Ewa Ziemba

This book constitutes revised selected papers from the 14th Conference on Advanced Information Technologies for Management, AITM 2016, and the 11th Conference on Information Systems Management, ISM 2016, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Gdansk, Poland, in September 2016. The 13 papers presented in this volume were carefully reviewed and selected from 51 submissions. They were organized in topical sections named: information technology and systems for knowledge management; information technology and systems for business transformation; and implementation and evaluation of information systems.

Information Technology Governance in Public Organizations

by Lazar Rusu Gianluigi Viscusi

This book examines trends and challenges in research on IT governance in public organizations, reporting innovative research and new insights in the theories, models and practices within the area. As we noticed, IT governance plays an important role in generating value from organization's IT investments. However there are different challenges for researchers in studying IT governance in public organizations due to the differences between political, administrative, and practices in these organizations. The first section of the book looks at Management issues, including an introduction to IT governance in public organizations; a systematic review of IT alignment research in public organizations; the role of middle managers in aligning strategy and IT in public service organizations; and an analysis of alignment and governance with regard to IT-related policy decisions. The second section examines Modelling, including a consideration of the challenges faced by public administration; a discussion of a framework for IT governance implementation suitable to improve alignment and communication between stakeholders of IT services; the design and implementation of IT architecture; and the adoption of enterprise architecture in public organizations. Finally, section three presents Case Studies, including IT governance in the context of e-government strategy implementation in the Caribbean; the relationship of IT organizational structure and IT governance performance in the IT department of a public research and education organization in a developing country; the relationship between organizational ambidexterity and IT governance through a study of the Swedish Tax Authorities; and the role of institutional logics in IT project activities and interactions in a large Swedish hospital.

Information Technology in Bio- and Medical Informatics: 8th International Conference, ITBAM 2017, Lyon, France, August 28–31, 2017, Proceedings (Lecture Notes in Computer Science #10443)

by Miroslav Bursa, Andreas Holzinger, M. Elena Renda and Sami Khuri

This book constitutes the refereed proceedings of the 8th International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2017, held in Lyon, France, in August 2017.The 3 revised full papers and 6 poster papers presented were carefully reviewed and selected from 15 submissions. The papers address a broad range of topics in applications of information technology to biomedical engineering and medical informatics.

Refine Search

Showing 24,301 through 24,325 of 53,816 results