Runtime Verification

Runtime Verification
Author: Axel Legay
Publisher: Springer
Total Pages: 439
Release: 2013-09-19
Genre: Computers
ISBN: 3642407870

This book constitutes the refereed proceedings of the 4th International Conference on Runtime Verification, RV 2013, held in Rennes, France, in September 2013. The 24 revised full papers presented together with 3 invited papers, 2 tool papers, and 6 tutorials were carefully reviewed and selected from 58 submissions. The papers address a wide range of specification languages and formalisms for traces; specification mining; program instrumentation; monitor construction techniques; logging, recording, and replay; fault detection, localization, recovery, and repair; program steering and adaptation; as well as metrics and statistical information gathering; combination of static and dynamic analyses and program execution visualization.

Information Theoretic Security

Information Theoretic Security
Author: Kaoru Kurosawa
Publisher: Springer Science & Business Media
Total Pages: 258
Release: 2010-09-03
Genre: Business & Economics
ISBN: 3642144950

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Theoretic Security, held in Shizuoka, Japan, in December 2009. The 13 revised full papers presented together with 6 invited lectures were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on leakage resilient cryptography, quantum cryptography and indistinguishability, connection to computational security, secret sharing, key agreement from common randomness, random graph and group testing, reliable data transmission and computation, as well as fingerprint and watermarking.

Computer Security -- ESORICS 2013

Computer Security -- ESORICS 2013
Author: Jason Crampton
Publisher: Springer
Total Pages: 810
Release: 2013-08-15
Genre: Computers
ISBN: 3642402038

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

Blockchain and Applications

Blockchain and Applications
Author: Javier Prieto
Publisher: Springer Nature
Total Pages: 383
Release: 2021-09-02
Genre: Computers
ISBN: 3030861627

This book constitutes the refereed proceedings of the 1st International Congress on Blockchain and Applications 2021, BLOCKCHAIN’21, held in Salamanca, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The 38 full papers presented were carefully reviewed and selected from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research.

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Author: Cyril Onwubiko
Publisher: Springer Nature
Total Pages: 476
Release: 2023-03-07
Genre: Science
ISBN: 9811964149

This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Information Systems Security

Information Systems Security
Author: Sushil Jajodia
Publisher: Springer Science & Business Media
Total Pages: 400
Release: 2011-11-29
Genre: Business & Economics
ISBN: 3642255590

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Programming Languages and Systems

Programming Languages and Systems
Author: Peter Müller
Publisher: Springer Nature
Total Pages: 772
Release: 2020-04-17
Genre: Computers
ISBN: 3030449149

This open access book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which was planned to take place in Dublin, Ireland, in April 2020, as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The actual ETAPS 2020 meeting was postponed due to the Corona pandemic. The papers deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems.

Information and Communications Security

Information and Communications Security
Author: Liqun Chen
Publisher: Springer
Total Pages: 448
Release: 2008-10-16
Genre: Computers
ISBN: 3540886257

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.

Project SAVE

Project SAVE
Author: Dennis Hansen
Publisher: Royal Danish Defence College
Total Pages: 138
Release: 2017-01-02
Genre: Computers
ISBN: 8771471685

Static Analysis

Static Analysis
Author: Sandrine Blazy
Publisher: Springer
Total Pages: 345
Release: 2015-09-01
Genre: Computers
ISBN: 3662482886

This book constitutes the refereed proceedings of the 22nd International Static Analysis Symposium, SAS 2015, held in Saint-Malo, France, in September 2015. The 18 papers presented in this volume were carefully reviewed and selected from 44 submissions. All fields of static analysis as a fundamental tool for program verification, bug detection, compiler optimization, program understanding, and software maintenance are addressed, featuring theoretical, practical, and application advances in the area