PROCEEDINGS OF THE 23RD CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN – FMCAD 2023

PROCEEDINGS OF THE 23RD CONFERENCE ON FORMAL METHODS IN COMPUTER-AIDED DESIGN – FMCAD 2023
Author: Alexander Nadel
Publisher: TU Wien Academic Press
Total Pages: 332
Release: 2023-10-13
Genre: Computers
ISBN: 3854480601

The Conference on Formal Methods in Computer-Aided Design (FMCAD) is an annual conference on the theory and applications of formal methods in hardware and system in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system testing.

Proceedings of the Second International Conference on Innovations in Computing Research (ICR’23)

Proceedings of the Second International Conference on Innovations in Computing Research (ICR’23)
Author: Kevin Daimi
Publisher: Springer Nature
Total Pages: 460
Release: 2023-06-16
Genre: Technology & Engineering
ISBN: 3031353080

The Second International Conference on Innovations in Computing Research (ICR’23) brings together a diverse group of researchers from all over the world with the intent of fostering collaboration and dissemination of the innovations in computing technologies. The conference is aptly segmented into six tracks: Data Science, Computer and Network Security, Health Informatics and Medical Imaging, Computer Science and Computer Engineering Education, Internet of Things, and Smart Cities/Smart Energy. These tracks aim to promote a birds-of-the-same-feather congregation and maximize participation. The Data Science track covers a wide range of topics including complexity score for missing data, deep learning and fake news, cyberbullying and hate speech, surface area estimation, analysis of gambling data, car accidents predication model, augmenting character designers’ creativity, deep learning for road safety, effect of sleep disturbances on the quality of sleep, deep learning-based path-planning, vehicle data collection and analysis, predicting future stocks prices, and trading robot for foreign exchange. Computer and Network Security track is dedicated to various areas of cybersecurity. Among these are decentralized solution for secure management of IoT access rights, multi-factor authentication as a service (MFAaaS) for federated cloud environments, user attitude toward personal data privacy and data privacy economy, host IP obfuscation and performance analysis, and vehicle OBD-II port countermeasures. The Computer Science and Engineering Education track enfolds various educational areas, such as data management in industry–academia joint research: a perspective of conflicts and coordination in Japan, security culture and security education, training and awareness (SETA), influencing information security management, engaging undergraduate students in developing graphical user interfaces for NSF funded research project, and emotional intelligence of computer science teachers in higher education. On the Internet of Things (IoT) track, the focus is on industrial air quality sensor visual analytics, social spider optimization meta-heuristic for node localization optimization in wireless sensor networks, and privacy aware IoT-based fall detection with infrared sensors and deep learning. The Smart Cities and Smart Energy track spans various areas, which include, among others, research topics on heterogeneous transfer learning in structural health monitoring for high-rise structures and energy routing in energy Internet using the firefly algorithm.

Formal Methods

Formal Methods
Author: André Platzer
Publisher: Springer Nature
Total Pages: 692
Release:
Genre:
ISBN: 3031711629

Proceedings of the Future Technologies Conference (FTC) 2018

Proceedings of the Future Technologies Conference (FTC) 2018
Author: Kohei Arai
Publisher: Springer
Total Pages: 1188
Release: 2018-10-17
Genre: Technology & Engineering
ISBN: 3030026868

The book, presenting the proceedings of the 2018 Future Technologies Conference (FTC 2018), is a remarkable collection of chapters covering a wide range of topics, including, but not limited to computing, electronics, artificial intelligence, robotics, security and communications and their real-world applications. The conference attracted a total of 503 submissions from pioneering researchers, scientists, industrial engineers, and students from all over the world. After a double-blind peer review process, 173 submissions (including 6 poster papers) have been selected to be included in these proceedings. FTC 2018 successfully brought together technology geniuses in one venue to not only present breakthrough research in future technologies but to also promote practicality and applications and an intra- and inter-field exchange of ideas. In the future, computing technologies will play a very important role in the convergence of computing, communication, and all other computational sciences and applications. And as a result it will also influence the future of science, engineering, industry, business, law, politics, culture, and medicine. Providing state-of-the-art intelligent methods and techniques for solving real-world problems, as well as a vision of the future research, this book is a valuable resource for all those interested in this area.

Theory of Cryptography

Theory of Cryptography
Author: Amos Beimel
Publisher: Springer
Total Pages: 739
Release: 2018-11-07
Genre: Computers
ISBN: 3030038106

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS

On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS
Author: Zahir Tari
Publisher: Springer
Total Pages: 699
Release: 2007-11-21
Genre: Computers
ISBN: 3540768432

This two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2007), Distributed Objects and Applications (DOA 2007), Ontologies, Databases and Applications of Semantics (ODBASE 2007), Grid computing, high performance and Distributed Applications (GADA 2007), and Information Security (IS 2007) held as OTM 2007 in Vilamoura, Portugal, in November 2007.

Securing Cyber-Physical Systems

Securing Cyber-Physical Systems
Author: Al-Sakib Khan Pathan
Publisher: CRC Press
Total Pages: 430
Release: 2015-10-06
Genre: Computers
ISBN: 1498700993

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deploy

Big Data Analytics in Cybersecurity

Big Data Analytics in Cybersecurity
Author: Onur Savas
Publisher: CRC Press
Total Pages: 452
Release: 2017-09-18
Genre: Business & Economics
ISBN: 1351650416

Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analytics in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators. Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes. Bringing together experts from academia, government laboratories, and industry, the book provides insight to both new and more experienced security professionals, as well as data analytics professionals who have varying levels of cybersecurity expertise. It covers a wide range of topics in cybersecurity, which include: Network forensics Threat analysis Vulnerability assessment Visualization Cyber training. In addition, emerging security domains such as the IoT, cloud computing, fog computing, mobile computing, and cyber-social networks are examined. The book first focuses on how big data analytics can be used in different aspects of cybersecurity including network forensics, root-cause analysis, and security training. Next it discusses big data challenges and solutions in such emerging cybersecurity domains as fog computing, IoT, and mobile app security. The book concludes by presenting the tools and datasets for future cybersecurity research.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
Author: Pierangela Samarati
Publisher: Springer
Total Pages: 396
Release: 2010-04-07
Genre: Computers
ISBN: 3642123686

Annotation This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010. The 20 revised full papers and 10 short papers were carefully reviewed and selected from 69 submissions. They are organized in topical sections on embedded security, protocols, highly constrained embedded systems, security, smart card security, algorithms, hardware implementations, embedded systems and anonymity/database security.

Information and Communications Security

Information and Communications Security
Author: David Naccache
Publisher: Springer
Total Pages: 808
Release: 2018-10-26
Genre: Computers
ISBN: 3030019500

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.