- Table View
- List View
Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Lecture Notes in Computer Science #9816)
by Matthew Robshaw Jonathan KatzThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.
Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9814)
by Matthew Robshaw Jonathan KatzThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.
Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Lecture Notes in Computer Science #9666)
by Marc Fischlin Jean-Sébastien CoronThe two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowled≥ pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leaka≥ in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.
Advances in Cultural Tourism Research: Proceedings of the International Conference on Cultural Tourism Advances, June 2023, Belgium (Advances in Digital and Cultural Tourism Management)
by Bart Neuts João Martins Marinos IoannidesThis open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by examining successful policy interventions, emerging cultural tourism trends, advancements in visitor management systems, new business and governance models, and the opportunities arising from ICT in the twenty-first century. This book presents recent key advances and their significant outcomes in the domain of European Cultural Tourism.
Advances in Culturally-Aware Intelligent Systems and in Cross-Cultural Psychological Studies (Intelligent Systems Reference Library #134)
by Colette FaucherThis book offers valuable new insights into the design of culturally-aware systems. In its first part, it is devoted to presenting selected Culturally-Aware Intelligent Systems devised in the field of Artificial Intelligence and its second part consists of two sub-parts that offer a source of inspiration for building modelizations of Culture and of its influence on the human mind and behavior, to be used in new Culturally-Aware Intelligent Systems. Those sub-parts present the results of experiments conducted in two fields that study Culture and its influence on the human mind's functions: Cultural Neuroscience and Cross-Cultural Psychology. In this era of globalization, people from different countries and cultures have the opportunity to interact directly or indirectly in a wide variety of contexts. Despite differences in their ways of thinking and reasoning, their behaviors, their values, lifestyles, customs and habits, languages, religions - in a word, their cultures - they must be able to collaborate on projects, to understand each other's views, to communicate in such a way that they don't offend each other, to anticipate the effects of their actions on others, and so on. As such, it is of primary importance to understand how culture affects people's mental activities, such as perception, interpretation, reasoning, emotion and behavior, in order to anticipate possible misunderstandings due to differences in handling the same situation, and to try and resolve them. Artificial Intelligence, and more specifically, the field of Intelligent Systems design, aims at building systems that mimic the behavior of human beings in order to complete tasks more efficiently than humans could by themselves. Consequently, in the last decade, experts and scholars in the field of Intelligent Systems have been increasingly tackling the notion of cultural awareness. A Culturally-Aware Intelligent System can be defined as a system where Culture-related or, more generally, socio-cultural information is modeled and used to design the human-machine interface, or to provide support with the task carried out by the system, be it reasoning, simulation or any other task involving cultural knowledge.
Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers (Communications in Computer and Information Science #1487)
by Nibras Abdullah Selvakumar Manickam Mohammed AnbarThis book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers (Communications in Computer and Information Science #1132)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the First International Conference on Advances in Cyber Security, ACeS 2019, held in Penang, Malaysia, in July-August 2019.The 25 full papers and 1 short paper were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on internet of things, industry and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and DDoS and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication.
Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers (Communications in Computer and Information Science #1347)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
Advances in Cyber Security: Technology, Operations, and Experiences
by D. Frank Hsu Dorothy MarinucciAs you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.The world’s foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; toFBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation.The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security—including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks.Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public–private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyberecosystem.
Advances in Cyber Security: Principles, Techniques, and Applications
by Kuan-Ching Li Xiaofeng Chen Willy SusiloThis book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)
by Shishir K. Shandilya Neal Wagner Atulya K. NagarThis book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Advances in Cyber Security and Intelligent Analytics
by Abhishek Verma Jitendra Kumar Hari Mohan Gaur Vrijendra Singh Valentina Emilia BalasWe live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models—IoT, SDN, and ICN—to support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (Lecture Notes in Electrical Engineering #643)
by Vinit Kumar Gunjan Sabrina Senatore Amit Kumar Xiao-Zhi Gao Suresh MeruguThis book highlights recent advances in Cybernetics, Machine Learning and Cognitive Science applied to Communications Engineering and Technologies, and presents high-quality research conducted by experts in this area. It provides a valuable reference guide for students, researchers and industry practitioners who want to keep abreast of the latest developments in this dynamic, exciting and interesting research field of communication engineering, driven by next-generation IT-enabled techniques. The book will also benefit practitioners whose work involves the development of communication systems using advanced cybernetics, data processing, swarm intelligence and cyber-physical systems; applied mathematicians; and developers of embedded and real-time systems. Moreover, it shares insights into applying concepts from Machine Learning, Cognitive Science, Cybernetics and other areas of artificial intelligence to wireless and mobile systems, control systems and biomedical engineering.
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures #4)
by Ahmed A. Abd El-Latif Yassine Maleh Wojciech Mazurczyk Mohammed ELAffendi Mohamed I. AlkanhalThis book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.
Advances in Cybersecurity Management
by Kevin Daimi Cathryn PeoplesThis book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.
Advances in Data Analysis with Computational Intelligence Methods: Dedicated to Professor Jacek Żurada (Studies in Computational Intelligence #738)
by Janusz Kacprzyk Leszek Rutkowski Adam E Gawęda Gary G. YenThis book is a tribute to Professor Jacek Żurada, who is best known for his contributions to computational intelligence and knowledge-based neurocomputing. It is dedicated to Professor Jacek Żurada, Full Professor at the Computational Intelligence Laboratory, Department of Electrical and Computer Engineering, J. B. Speed School of Engineering, University of Louisville, Kentucky, USA, as a token of appreciation for his scientific and scholarly achievements, and for his longstanding service to many communities, notably the computational intelligence community, in particular neural networks, machine learning, data analyses and data mining, but also the fuzzy logic and evolutionary computation communities, to name but a few. At the same time, the book recognizes and honors Professor Żurada's dedication and service to many scientific, scholarly and professional societies, especially the IEEE (Institute of Electrical and Electronics Engineers), the world's largest professional technical professional organization dedicated to advancing science and technology in a broad spectrum of areas and fields. The volume is divided into five major parts, the first of which addresses theoretic, algorithmic and implementation problems related to the intelligent use of data in the sense of how to derive practically useful information and knowledge from data. In turn, Part 2 is devoted to various aspects of neural networks and connectionist systems. Part 3 deals with essential tools and techniques for intelligent technologies in systems modeling and Part 4 focuses on intelligent technologies in decision-making, optimization and control, while Part 5 explores the applications of intelligent technologies.
Advances in Data Analytics for Influencer Marketing: An Interdisciplinary Approach (Information Systems Engineering and Management #9)
by Soumi Dutta Álvaro Rocha Pushan Kumar Dutta Pronaya Bhattacharya Ramanjeet SinghIn the ever-evolving landscape of digital marketing, influencer marketing has emerged as a game-changer, captivating audiences and driving brand engagement like never before. However, success in this dynamic field requires more than just intuition—it demands a mastery of data analytics and an interdisciplinary approach. Introducing this groundbreaking book equips marketers, analysts, and business leaders with the tools and strategies to navigate the complexities of influencer marketing with precision and confidence. Written by leading experts in the field, this comprehensive book explores the intersection of data analytics, consumer behavior, and influencer marketing, offering a holistic perspective on this powerful marketing technique. This book equips the readers with the knowledge and tools to stay ahead of the curve and drive unparalleled success in the ever-evolving world of influencer marketing.
Advances in Data and Information Sciences: Proceedings of ICDIS 2017, Volume 2 (Lecture Notes in Networks and Systems #39)
by Mohan L. Kolhe Munesh C. Trivedi Shailesh Tiwari Vikash Kumar SinghThe book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Data and Information Systems (ICDIS 2017), held at Indira Gandhi National Tribal University, India from November 3 to 4, 2017. The book covers all aspects of computational sciences and information security. In chapters written by leading researchers, developers and practitioner from academia and industry, it highlights the latest developments and technical solutions, helping readers from the computer industry capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings of ICDIS 2019 (Lecture Notes in Networks and Systems #94)
by Krishn K. Mishra Shailesh Tiwari Munesh C. Trivedi Mohan L. KolheThis book gathers a collection of high-quality peer-reviewed research papers presented at the 2nd International Conference on Data and Information Sciences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29–30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings of ICDIS 2022 (Lecture Notes in Networks and Systems #522)
by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar SinghThis book gathers a collection of high-quality peer-reviewed research papers presented at the 4th International Conference on Data and Information Sciences (ICDIS 2022), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 6 – 7, 2022. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings of ICDIS 2023 (Lecture Notes in Networks and Systems #796)
by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar SinghThis book gathers a collection of high-quality peer-reviewed research papers presented at the 5th International Conference on Data and Information Sciences (ICDIS 2023), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on June 16–17, 2023. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it shows readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings of ICDIS 2024, Volume 1 (Lecture Notes in Networks and Systems #1127)
by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Brajesh Kumar SinghThis book gathers a collection of high-quality peer-reviewed research papers presented at the 6th International Conference on Data and Information Sciences (ICDIS 2024), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 24–25, 2024. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it shows readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings Of Icdis 2017, Volume 1 (Lecture Notes In Networks And Systems #38)
by Shailesh Tiwari Munesh C. Trivedi Mohan L. Kolhe Vikash Kumar SinghThe book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Data and Information Systems (ICDIS 2017), held at Indira Gandhi National Tribal University, India from November 3 to 4, 2017. The book covers all aspects of computational sciences and information security. In chapters written by leading researchers, developers and practitioner from academia and industry, it highlights the latest developments and technical solutions, helping readers from the computer industry capitalize on key advances in next-generation computer and communication technology.
Advances in Data and Information Sciences: Proceedings of ICDIS 2021 (Lecture Notes in Networks and Systems #318)
by Shailesh Tiwari Munesh C. Trivedi Mohan Lal Kolhe K. K. Mishra Brajesh Kumar SinghThis book gathers a collection of high-quality peer-reviewed research papers presented at the 3rd International Conference on Data and Information Sciences (ICDIS 2021), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 14 – 15, 2021. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
Advances in Data Clustering: Theory and Applications
by Fadi Dornaika Denis Hamad Joseph Constantin Vinh Truong HoangClustering, a foundational technique in data analytics, finds diverse applications across scientific, technical, and business domains. Within the theme of “Data Clustering,” this book assumes substantial importance due to its indispensable clustering role in various contexts. As the era of online media facilitates the rapid generation of large datasets, clustering emerges as a pivotal player in data mining and machine learning. At its core, clustering seeks to unveil heterogeneous groups within unlabeled data, representing a crucial unsupervised task in machine learning. The objective is to automatically assign labels to each unlabeled datum with minimal human intervention. Analyzing this data allows for categorization and drawing conclusions applicable across diverse application domains. The challenge with unlabeled data lies in defining a quantifiable goal to guide the model-building process, constituting the central theme of clustering. This book presents concepts and different methodologies of data clustering. For example, deep clustering of images, semi-supervised deep clustering, deep multi-view clustering, etc. This book can be used as a reference for researchers and postgraduate students in related research background.