- Table View
- List View
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Wireless Networks)
by Beibei Li Rongxing Lu Gaoxi XiaoThis book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals.Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
Detection of Intrusions and Malware, and Vulnerability Assessment
by Magnus Almgren Vincenzo Gulisano Federico MaggiThis book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
Detection of Intrusions and Malware, and Vulnerability Assessment
by Juan Caballero Urko Zurutuza Ricardo J. RodríguezThis book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.
Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings (Lecture Notes in Computer Science #13358)
by Lorenzo Cavallaro Daniel Gruss Giancarlo Pellegrino Giorgio GiacintoThis book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings (Lecture Notes in Computer Science #10885)
by Cristiano Giuffrida Sébastien Bardin Gregory BlancThis book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
Detection of Intrusions and Malware, and Vulnerability Assessment: 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings (Lecture Notes in Computer Science #13959)
by Daniel Gruss Federico Maggi Mathias Fischer Michele CarminatiThis book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security.
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings (Lecture Notes in Computer Science #9721)
by Juan Caballero, Urko Zurutuza and Ricardo J. RodríguezThis book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.
Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings (Lecture Notes in Computer Science #14828)
by Federico Maggi Mathias Payer Michele Carminati Manuel EgeleThis book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17–19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.
Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12223)
by Clémentine Maurice Leyla Bilge Gianluca Stringhini Nuno NevesThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings (Lecture Notes in Computer Science #12756)
by Nuno Neves Leyla Bilge Lorenzo Cavallaro Giancarlo PellegrinoThis book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas.Chapter “SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science #11543)
by Roberto Perdisci Clémentine Maurice Giorgio Giacinto Magnus AlmgrenThis book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
Detection of Intrusions and Malware, and Vulnerability Assessment
by Michalis Polychronakis Michael MeierThis book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
Detection of Karst Voids at Deep Pile Foundation
by Liu Liu Zhenming Shi Ming Peng Shaojun Li Fengjuan TaoKarst voids at pile locations can have a significant negative impact on the bearing capacity and overall safety of cast-in-place pile foundations. This book introduces a state-of-the-art detection system, comprising of specialized equipment, algorithms, and software, designed to identify karst voids during deep cast-in-place pile foundation construction. The system includes a unique multifrequency borehole sonic probe, a single borehole radar, two pile hole sonar probes, and a corresponding signal analysis method. Several field and synthetic tests have been conducted to detect karst voids during cast-in-place pile foundation construction, and the results demonstrate that this technology can offer detailed geological information for pile design and ensure the safety of foundation construction. The work presented in this book has received the First Prize for Technological Invention in Shanghai, China in 2022.
Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)
by Hans JonassonGood requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,
Deterministic and Stochastic Optimal Control and Inverse Problems
by Baasansuren JadambaInverse problems of identifying parameters and initial/boundary conditions in deterministic and stochastic partial differential equations constitute a vibrant and emerging research area that has found numerous applications. A related problem of paramount importance is the optimal control problem for stochastic differential equations. This edited volume comprises invited contributions from world-renowned researchers in the subject of control and inverse problems. There are several contributions on optimal control and inverse problems covering different aspects of the theory, numerical methods, and applications. Besides a unified presentation of the most recent and relevant developments, this volume also presents some survey articles to make the material self-contained. To maintain the highest level of scientific quality, all manuscripts have been thoroughly reviewed.
Deterministic Extraction from Weak Random Sources
by Ariel GabizonA deterministic extractor is a function that extracts almost perfect random bits from a weak random source. In this research monograph the author constructs deterministic extractors for several types of sources. A basic theme in this work is a methodology of recycling randomness which enables increasing the output length of deterministic extractors to near optimal length. The author's main work examines deterministic extractors for bit-fixing sources, deterministic extractors for affine sources and polynomial sources over large fields, and increasing the output length of zero-error dispersers. This work will be of interest to researchers and graduate students in combinatorics and theoretical computer science.
Deterministic Network Calculus: From Theory to Practical Implementation
by Anne Bouillard Marc Boyer Euriell Le CorroncDeterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its theoretical foundations to its implementations. The book is divided into three parts. The first part focuses on the (min,plus) framework and its algorithmic aspects. The second part defines the network calculus model and analyzes one server in isolation. Different service and scheduling policies are discussed, particularly when data is packetized. The third part is about network analyses. Pay burst only once and pay multiplexing only once phenomena are exhibited, and different analyses are proposed and compared. This includes the linear programming approaches that compute tight performance bounds. Finally, some partial results on the stability are detailed.
Deterministic, Stochastic, and Deep Learning Methods for Computational Electromagnetics
by Wei CaiThis book provides a well-balanced and comprehensive picture based on clear physics, solid mathematical formulation, and state-of-the-art useful numerical methods in deterministic, stochastic, deep neural network machine learning approaches for computer simulations of electromagnetic and transport processes in biology, microwave and optical wave devices, and nano-electronics. Computational research has become strongly influenced by interactions from many different areas including biology, physics, chemistry, engineering, etc. A multifaceted approach addressing the interconnection among mathematical algorithms and physical foundation and application is much needed to prepare graduate students and researchers in applied mathematics and sciences and engineering for innovative advanced computational research in many applications areas, such as biomolecular solvation in solvents, radar wave scattering, the interaction of lights with plasmonic materials, plasma physics, quantum dots, electronic structure, current flows in nano-electronics, and microchip designs, etc.
Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace
by Brian M. Mazanec Bradley A. ThayerWhile the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
Detonado não-oficial de Super Smash Bros Wii U, Dicas, Truques, e Segredos do Jogo
by Michel Pinheiro Joshua Abbott*Guia Não-Oficial* Guia de Estratégias e Dicas Avançadas. Este é o mais abrangente e o único guia detalhado que você vai encontrar online. Disponível para download instantâneo em seu celular, dispositivo de eBook ou em papel.
Deus Ex: Icarus Effect
by James SwallowIT'S NOT THE END OF THE WORLD. BUT YOU CAN SEE IT FROM HERE. In the near future, with physical augmentation gaining ground and nano-cybernetics only years away, the dawn of limitless human evolution is just beyond the horizon, and a secret corporate cabal of ruthless men intends to make sure that humankind stays under its control. But two people on opposite sides of the world are starting to ask questions that could get them killed. Secret Service agent Anna Kelso has been suspended for investigating the shooting that claimed her partner's life. Anna suspects that the head of a bio-augmentation firm was the real target, and against orders she's turned up a few leads concerning a covert paramilitary force and a cadre of underground hackers. But the cover-up runs deep, and now there's a target on her back. Meanwhile, Ben Saxon, former SAS officer turned mercenary, joins a shadowy special ops outfit. They say they're a force for good, but Saxon quickly learns that the truth is not so clear-cut. So begins a dangerous quest to uncover a deadly secret that will take him from Moscow to London, D. C. to Geneva, and to the dark truth--if he lives that long. The year is 2027; in a world consumed by chaos and conspiracy, two people are set on a collision course with the most powerful and dangerous organization in history--and the fate of humanity hangs in the balance.
Develop Intelligent iOS Apps with Swift: Understand Texts, Classify Sentiments, and Autodetect Answers in Text Using NLP
by Özgür SahinBuild smart apps capable of analyzing language and performing language-specific tasks, such as script identification, tokenization, lemmatization, part-of-speech tagging, and named entity recognition. This book will get you started in the world of building literate, language understanding apps. Cutting edge ML tools from Apple like CreateML, CoreML, and TuriCreate will become natural parts of your development toolbox as you construct intelligent, text-based apps. You'll explore a wide range of text processing topics, including reprocessing text, training custom machine learning models, converting state-of-the-art NLP models to CoreML from Keras, evaluating models, and deploying models to your iOS apps. You’ll develop sample apps to learn by doing. These include apps with functions for detecting spam SMS, extracting text with OCR, generating sentences with AI, categorizing the sentiment of text, developing intelligent apps that read text and answers questions, converting speech to text, detecting parts of speech, and identifying people, places, and organizations in text. Smart app development involves mainly teaching apps to learn and understand input without explicit prompts from their users. These apps understand what is in images, predict future behavior, and analyze texts. Thanks to natural language processing, iOS can auto-fix typos and Siri can understand what you're saying. With Apple’s own easy-to-use tool, Create ML, they’ve brought accessible ML capabilities to developers. Develop Intelligent iOS Apps with Swift will show you how to easily create text classification and numerous other kinds of models. What You'll Learn Incorporate Apple tools such as CreateML and CoreML into your Swift toolbox Convert state-of-the-art NLP models to CoreML from Keras Teach your apps to predict words while users are typing with smart auto-complete Who This Book Is For Novice developers and programmers who wish to implement natural language processing in their iOS applications and those who want to learn Apple's native ML tools.
Develop Microsoft HoloLens Apps Now
by Allen G. TaylorThis is the first book to describe the Microsoft HoloLens wearable augmented reality device and provide step-by-step instructions on how developers can use the HoloLens SDK to create Windows 10 applications that merge holographic virtual reality with the wearer's actual environment. Best-selling author Allen G. Taylor explains how to develop and deliver HoloLens applications via Microsoft's ecosystem for third party apps. Readers will also learn how HoloLens differs from other virtual and augmented reality devices and how to create compelling applications to fully utilize its capabilities. What You Will Learn: The features and capabilities of HoloLens How to build a simple Windows 10 app optimized for HoloLens The tools and resources contained in the HoloLens SDK How to build several HoloLens apps, using the SDK tools
Develop on Yammer
by Pathik Rawal Pryank RohillaDevelop on Yammer is your guide to integrating the Yammer social network with your company's application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms, including SharePoint, ASP. NET, and Windows Phone. The book begins with an introduction to the development options available along with guidance on how to set up a Yammer developer account. You'll then take your first step in Yammer integration by building a Yammer feed into a web page or other JavaScript-based client application, before diving into app creation and management on the Yammer platform. The authors provide a deep dive into the Yammer authorization process from client-side and server-side perspectives, and you'll find out how to work closely with Yammer's data streams and its full range of development possibilities using Open Graph and Yammer's REST API. The final chapters cover how to build Yammer integration into standalone applications for SharePoint and Windows Phone 8 with Yammer SDKs. All chapters are illustrated with examples and sample code, and a case study follows the development of a workplace training application as the authors apply each technique, so you can see how to make the most of what Yammer has to offer. What you'll learn Why develop on Yammer, and what development options are available How to add a Yammer feed to an HTML-based application using Yammer Embed, to bring relevant news and discussions into the contexts where they matter How to develop custom Yammer features for your SharePoint, Office or web applications on the client side with the Yammer JavaScript SDK How to carry out secure authorization and authentication on Yammer How to use Yammer Open Graph and REST APIs to posts messages, create custom activities and get data from Yammer-integrated applications How to work with the Yammer Windows Phone 8 SDK to add Yammer functionality to a Windows Phone 8 application Who this book is for This book is targeted at developers with a background in . NET/C# development. Readers should be comfortable working with JavaScript. Software architects will also find this book valuable for planning social integration across their companies' business ecosystems. Table of Contents Chapter 1: Introduction to Yammer Development Chapter 2: Yammer Feed Integration with Yammer Embed Chapter 3: Yammer App Development Basics Chapter 4: Authenticating Your Yammer Users Chapter 5: Writing Data into Yammer with Open Graph Chapter 6: Developing Custom Integrations with the Yammer REST API Chapter 7: Build Social Apps Using Yammer's JavaScript SDK Chapter 8: Build Social Apps Using Yammer's Windows Phone 8 SDK
Developer Advocacy: Establishing Trust, Creating Connections, and Inspiring Developers to Build Better
by Chris Riley Chris TozziNo matter which point you're currently at on the developer advocacy journey – whether you've already implemented a developer advocate function or you're exploring the possibility – this book is for you. This book provides actionable guidance that business and technology leaders can use to understand the benefits of advocacy, identify what goes into the function, and learn how to maximize the success of developer advocate teams.Developer advocacy is a role that is sometimes hard to quantify and build – but you feel it when you’re missing it. Companies are struggling to solidify advocacy despite a strong desire to do so and little guidance exists for businesses seeking to build a developer advocacy program or assess its effectiveness. This book will show you how to get an advocacy program in your business: the basics of having an advocacy program, what tasks and processes need to be set up, and how to identify key stakeholders. You'll see how companies of all types that sell to or engage with technical audiences can develop a developer advocacy strategy. Specifically, you'll learn what developer advocates do, how business can start an advocacy practice in your organization and how to scale and operationalize such a practice once it is in place. The book will further explore the metrics for measuring advocacy success and ways the scale advocacy teams internally and externally. The Power of Developer Advocacy explores the exciting career path of advocacy for developers and engineers. What You Will LearnDiscover what developer advocacy isDetermine which sorts of companies need the functionUnderstand what the primary strategic considerations for developer advocacy isWho This Book is For Existing and future advocacy leaders, would-be developer advocates, developer marketers and DevRel teams and leaders