Browse Results

Showing 33,776 through 33,800 of 74,209 results

Information Security Education. Education in Proactive Information Security: 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings (IFIP Advances in Information and Communication Technology #557)

by Marianthi Theocharidou Lynette Drevin

This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security Education, WISE 12, held in Lisbon, Portugal, in June 2019.The 12 revised full papers presented were carefully reviewed and selected from 26 submissions. The papers are organized in the following topical sections: innovation in curricula; training; applications and cryptography; and organizational aspects.

Information Security Education. Information Security in Action: 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings (IFIP Advances in Information and Communication Technology #579)

by Marianthi Theocharidou Lynette Drevin Suné Von Solms

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Information Security Planning: A Practical Approach

by Susan Lincke

This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing..

Information Security Technologies in the Decentralized Distributed Networks (Lecture Notes on Data Engineering and Communications Technologies #115)

by Tamara Radivilova Roman Oliynykov Oleksandr Kuznetsov Oleksandr Lemeshko

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Information Security and Cryptology: 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10726)

by Moti Yung Dongdai Lin Xiaofeng Chen

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11449)

by Moti Yung Xinyi Huang Fuchun Guo

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings (Lecture Notes in Computer Science #10946)

by Willy Susilo Guomin Yang

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Information Security for Automatic Speaker Identification

by Fathi E. El-Samie

The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.

Information Security of Highly Critical Wireless Networks

by Maurizio Martellini Stanislav Abaimov Sandro Gaycken Clay Wilson

This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing effectiveness and efficiency, resilience testing, and accountability of HCWN. Designed for researchers and professionals, this SpringerBrief provides essential information for avoiding malevolent uses of wireless networks. The content is also valuable for advanced-level students interested in security studies or wireless networks.

Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence #978)

by Madhusudan Singh

This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.

Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science #973)

by Jan Eloff Hein Venter Marianne Loock Marijke Coetzee Mariki Eloff

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Information Sharing and Collaboration: Workshop Summary

by Deepali M. Patel

After the September 11, 2001, terrorist attacks and subsequent anthrax mailings, the U. S. government prioritized a biosurveillance strategy aimed at detecting, monitoring, and characterizing national security health threats in human and animal populations, food, water, agriculture, and the environment. However, gaps and challenges in biosurveillance efforts and integration of biosurveillance activities remain. September 8-9, 2011, the IOM held a workshop to explore the information-sharing and collaboration processes needed for the nation's integrated biosurveillance strategy.

Information Sharing in Military Operations

by Joseph Soeters Irina Goldenberg Waylon H. Dean

This volume explores the interpersonal, organizational, and technological enablers and barriers to information and intelligence sharing in multinational and multiagency military, humanitarian, and counterterrorism operations. To this end the contributions present case studies and other empirical research. UN and special operations headquarters are studied, along with multinational operations in Mali, Iraq, and Afghanistan by the UN and by U. S. Central Command. Perennial themes are the need for a holistic approach to information sharing--one that incorporates all the above enablers--and the importance of learning from experience, which should be the basis for operational planning. There is still considerable ground to be gained in enhancing the efficacy of information sharing in the context of defense and security, and the present book contributes to this goal.

Information Sources in Science and Technology

by C. D. Hurt

A revised and updated text for library science students or as a library selection tool, serving as a critical guide to the secondary literature and an introduction to the pattern of primary literature published in the field of science and technology. It covers all types of reference material, with descriptive and evaluative annotations that define the scope of each work, its intended audience, and special features. Critical comments allow users to compare sources and make choices between similar titles. Paper edition (unseen), $32. Annotation c. by Book News, Inc., Portland, Or.

Information Spread in a Social Media Age: Modeling and Control

by Michael Muhlmeyer Shaurya Agarwal

The rise of social networks and social media has led to a massive shift in the ways information is dispersed. Platforms like Twitter and Facebook allow people to more easily connect as a community, but they can also be avenues for misinformation, fake news, and polarization. The need to examine, model, and analyze the trajectory of information spread within this new paradigm has never been greater. This text expands upon the authors’ combined teaching experience, engineering knowledge, and multiple academic journal publications on these topics to present an intuitive and easy to understand exploration of social media information spread alongside the technical and mathematical concepts. By design, this book uses simple language and accessible and modern case studies (including those centered around United States mass shootings, the #MeToo social movement, and more) to ensure it is accessible to the casual reader. At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. By reading this book and working through the included exercises, readers will gain a general understanding of modern social media systems, network fundamentals, model development techniques, and social marketing. The mathematical modeling of information spread over social media is heavily emphasized through a review of existing epidemiology and marketing based models. The book then presents novel models developed by the authors to account for modern social media concerns such as community filter bubbles, strongly polarized groups, and contentious information spread. Readers will learn how to build and execute simple case studies using Twitter data to help verify the text’s proposed models. Once the reader is armed with a fundamental understanding of mathematical modeling and social media-based system considerations, the book introduces more complex engineering control concepts, including controller design, PID control, and optimal control. Examples of control methods for social campaigns and misinformation mitigation applications are covered in a step-by-step format from problem formulation to solution simulation and results discussions. While many of the examples and methods are framed in the context of controlling social media information spread, the material is also directly applicable to many different types of controllable systems. With the essential background, models, and tools presented within, any interested reader can take the first steps toward exploring and taming the growing complexity of the modern social media age.

Information Storage: A Multidisciplinary Perspective

by Rolf Drechsler Cornelia S. Große

This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society. The editors brought together experts from a variety of disciplines. While it is generally agreed that information reduces uncertainties and that the ability to store it safely is of vital importance, these authors are open to different meanings of “information”: computer science considers the bit as the information block; neuroscience emphasizes the importance of information as sensory inputs that are processed and transformed in the brain; theories in psychology focus more on individual learning and on the acquisition of knowledge; and finally sociology looks at how interpersonal processes within groups or society itself come to the fore. The book will be of value to researchers and students in the areas of information theory, artificial intelligence, and computational neuroscience.

Information Support and Aircraft Flight Management (Springer Aerospace Technology)

by Oleg Ivanovich Zavalishin Anatoly Nikolaevich Korotonoshko Dmitry Alexandrovich Zatuchny Yury Grigorievich Shatrakov

This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 2 (Lecture Notes in Networks and Systems #1057)

by Vikrant Bhateja Dilip Kumar Sharma Zdzislaw Polkowski Jinshan Tang Afaq Ahmad

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 4 (Lecture Notes in Networks and Systems #1107)

by Vikrant Bhateja Zdzislaw Polkowski Milan Simic V. V. S. S. S. Chakravarthy Jinshan Tang

This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.

Information Systems And The Environment

by National Academy of Engineering

Information technology is a powerful tool for meeting environmental objectives and promoting sustainable development. This collection of papers by leaders in industry, government, and academia explores how information technology can improve environmental performance by individual firms, collaborations among firms, and collaborations among firms, government agencies, and academia. Information systems can also be used by nonprofit organizations and the government to inform the public about broad environmental issues and environmental conditions in their neighborhoods. Several papers address the challenges to information management posed by the explosive increase in information and knowledge about environmental issues and potential solutions, including determining what information is environmentally relevant and how it can be used in decision making. In addition, case studies are described and show how industry is using information systems to ensure sustainable development and meet environmental standards. The book also includes examples from the public sector showing how governments use information knowledge systems to disseminate “best practices” beyond big firms to small businesses, and from the world of the Internet showing how knowledge is shared among environmental advocates and the general public.

Information Systems Architecture and Technology: Part I (Advances in Intelligent Systems and Computing #1050)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem. Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems. This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections: Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing. Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling. Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part II (Advances in Intelligent Systems and Computing #1051)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Architecture and Technology: Part III (Advances in Intelligent Systems and Computing #1052)

by Jerzy Świątek Leszek Borzemski Zofia Wilimowska

This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.

Information Systems Design and Intelligent Applications: Proceedings Of Fourth International Conference India 2017 (Advances In Intelligent Systems And Computing #672)

by Suresh Chandra Satapathy Vikrant Bhateja Bao Le Nguyen Nhu Gia Nguyen Dac-Nhuong Le

The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Information System Design and Intelligent Applications (INDIA 2017) held at Duy Tan University, Da Nang, Vietnam during 15-17 June 2017. The book covers a wide range of topics of computer science and information technology discipline ranging from image processing, database application, data mining, grid and cloud computing, bioinformatics and many others. The various intelligent tools like swarm intelligence, artificial intelligence, evolutionary algorithms, bio-inspired algorithms have been well applied in different domains for solving various challenging problems.

Information Systems Design and Intelligent Applications: Proceedings of Fifth International Conference INDIA 2018 Volume 2 (Communications in Computer and Information Science #863)

by Xin-She Yang Roman Senkerik Suresh Chandra Satapathy Vikrant Bhateja Radhakhrishna Somanah

The book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Information System Design and Intelligent Applications (INDIA 2018), which was held at the Universite des Mascareignes, Mauritius from July 19 to 21, 2018. It covers a wide range of topics in computer science and information technology, from image processing, database applications and data mining, to grid and cloud computing, bioinformatics and many more. The intelligent tools discussed, e.g. swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms, are currently being applied to solve challenging problems in various domains.

Refine Search

Showing 33,776 through 33,800 of 74,209 results