Browse Results

Showing 49,276 through 49,300 of 59,655 results

Risk Modeling, Assessment, and Management

by Yacov Y. Haimes

Examines timely multidisciplinary applications, problems, and case histories in risk modeling, assessment, and managementRisk Modeling, Assessment, and Management, Third Edition describes the state of the art of risk analysis, a rapidly growing field with important applications in engineering, science, manufacturing, business, homeland security, management, and public policy. Unlike any other text on the subject, this definitive work applies the art and science of risk analysis to current and emergent engineering and socioeconomic problems. It clearly demonstrates how to quantify risk and construct probabilities for real-world decision-making problems, including a host of institutional, organizational, and political issues.Avoiding higher mathematics whenever possible, this important new edition presents basic concepts as well as advanced material. It incorporates numerous examples and case studies to illustrate the analytical methods under discussion and features restructured and updated chapters, as well as:A new chapter applying systems-driven and risk-based analysis to a variety of Homeland Security issuesAn accompanying FTP site--developed with Professor Joost Santos--that offers 150 example problems with an Instructor's Solution Manual and case studies from a variety of journalsCase studies on the 9/11 attack and Hurricane KatrinaAn adaptive multiplayer Hierarchical Holographic Modeling (HHM) game added to Chapter ThreeThis is an indispensable resource for academic, industry, and government professionals in such diverse areas as homeland and cyber security, healthcare, the environment, physical infrastructure systems, engineering, business, and more. It is also a valuable textbook for both undergraduate and graduate students in systems engineering and systems management courses with a focus on our uncertain world.

Risk Thinking for Cloud-Based Application Services

by Eric Bauer

Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise’s objectives will be achieved, thereby enabling organizational success. This work methodically considers the risks and opportunities that an enterprise taking their applications or services onto the cloud must consider to obtain the cost reductions and service velocity improvements they desire without suffering the consequences of unacceptable user service quality.

Risks and Resilience of Collaborative Networks

by Luis M. Camarinha-Matos Frédérick Bénaben Willy Picard

This book constitutes the refereed proceedings of the 16th IFIP WG 5. 5 Working Conference on Virtual Enterprises, PRO-VE 2015, held in Albi, France, in October 2015. The 61 revised papers were carefully selected from 126 submissions. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications, with a strong focus on the following areas: risks in collaborative networks; agility and resilience in collaborative networks; collaboration frameworks; logistics and transportation; innovation networks; governance in collaborative networks; collaborative communities; information and assets sharing; business processes; performance and optimization; and network formation.

Risks and Security of Internet and Systems

by Frédéric Cuppens Nora Cuppens Jean-Louis Lanet Axel Legay

This book constitutes the revised selected papers from the 11th International Conference on Risk and Security of Internet and Systems, CRISIS 2016, held in Roscoff, France, in September 2016. The 17 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover diverse research themes, ranging from classic topics, such as intrusion detection, applied cryptography, formal methods and methodology for risk and security analysis, to emerging issues, such as ransomware and security of software defined networking or virtualization techniques.

Risks and Security of Internet and Systems: 18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6–8, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14529)

by Frédéric Cuppens Guillermo Navarro-Arribas Nora Cuppens Abderrahim Ait Wakrime Redouane Benaini

This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6–8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems.

Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings (Lecture Notes in Computer Science #12026)

by Nora Cuppens-Boulahia Frédéric Cuppens Slim Kallel Ahmed Hadj Kacem

This book constitutes the revised selected papers from the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS 2019, held in Hammamet, Tunisia, in October 2019.The 20 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They cover diverse research themes that range from classic topics, such as risk analysis and management; access control and permission; secure embedded systems; network and cloud security; information security policy; data protection and machine learning for security; distributed detection system and blockchain.

Risks and Security of Internet and Systems: 11th International Conference, Crisis 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10158)

by Joaquin Garcia-Alfaro Axel Legay Jean-Louis Lanet Frédéric Cuppens Nora Cuppens

This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.The 12 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They cover diverse research themes, ranging from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.

Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12528)

by Joaquin Garcia-Alfaro Jean Leneutre Nora Cuppens Reda Yaich

This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.

Risks and Security of Internet and Systems: 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13857)

by Slim Kallel Mohamed Jmaiel Mohammad Zulkernine Ahmed Hadj Kacem Frédéric Cuppens Nora Cuppens

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.

Risks and Security of Internet and Systems

by Costas Lambrinoudakis Alban Gabillon

This book constitutes the thoroughly refereedpost-conference proceedings of the 10th International Conference on Risks andSecurity of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island,Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacyissues, privacy policies and policy based protocols, risk management, riskanalysis and vulnerability assessment, cloud systems and cryptography, andattack and security measures.

Risks and Security of Internet and Systems

by Javier Lopez Indrajit Ray Bruno Crispo

This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

Risks and Security of Internet and Systems: 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13204)

by Bo Luo Mohamed Mosbah Frédéric Cuppens Lotfi Ben Othmane Nora Cuppens Slim Kallel

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic.The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.

Risks and Security of Internet and Systems: 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11391)

by Akka Zemmari Mohamed Mosbah Nora Cuppens-Boulahia Frédéric Cuppens

This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.

Risks, Controls, and Security: Concepts and Applications

by Vasant Raval Ashok Fichadia

An accountant's guide to managing control risks In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks,Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them. Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts,issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses,including e-businesses: * Enterprise risk management * Control and security frameworks * Basic cryptography and public key infrastructure * Security for operating systems, applications, database management systems, and telecommunications * Network and web security * Policy, regulation, and ethics Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and"concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice." Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks,Controls and Security will prepare you well for meeting the challenge of protecting information assets.

Risks of Artificial Intelligence

by Vincent C. Müller

Featuring contributions from leading experts and thinkers in the theory of artificial intelligence (AI), this is one of the first books dedicated to examining the risks of AI. The book evaluates predictions of the future of AI, proposes ways to ensure that AI systems will be beneficial to humans, and then critically evaluates such proposals. The book covers the latest AI research, including the risks and future impacts. Ethical issues in AI are covered extensively along with an exploration of autonomous technology and its impact on humanity.

Risks, Relationships and Success Factors in IT Outsourcing: A Study in Large Companies (SpringerBriefs in Information Systems)

by Georg Hodosi Lazar Rusu

This book addresses the buying organizations' perspective on risks, relationships and success factors for accomplishing a successful IT Outsourcing (ITO). Today’s landscape in ITO is complex and these perspectives are important in ITO and therefore there is still a need for it to be further explored. Furthermore the studies concerned the risks, relationships and success factors in ITO need to be extended in more large companies from different countries to better understand how we could improve the ITO in these companies. In order to address this issue the authors of this book have performed different studies that span about 10 years concerning the risks, relationships and success factors in ITO in large companies in Sweden. The authors have focused on both theoretical and practical aspects concerning risks, relationships and success factors in ITO and they have used transaction cost theory, agency theory and core competency theory as main theories to support their research. The data concerning this study has been collected at two different times during the last 10 years with about five years' difference between them. In this way the performed research has enabled a comparison of the data collected on two different periods in time including of the related changes. The book will help researchers in ITO as well as practitioners like ITO decision makers in large companies to understand how to mitigate the ITO risks, improve their ITO relationships and identify the ITO success factors.

RITA 2018: Proceedings of the 6th International Conference on Robot Intelligence Technology and Applications (Lecture Notes in Mechanical Engineering)

by Anwar P. P. Abdul Majeed Jessnor Arif Mat-Jizat Mohd Hasnun Hassan Zahari Taha Han Lim Choi Junmo Kim

This book gathers the Proceedings of the 6th International Conference on Robot Intelligence Technology and Applications (RITA 2018). Reflecting the conference’s main theme, “Robotics and Machine Intelligence: Building Blocks for Industry 4.0,” it features relevant and current research investigations into various aspects of these building blocks. The areas covered include: Instrumentation and Control, Automation, Autonomous Systems, Biomechatronics and Rehabilitation Engineering, Intelligent Systems, Machine Learning, Robotics, Sensors and Actuators, and Machine Vision, as well as Signal and Image Processing. A valuable asset, the book offers researchers and practitioners a timely overview of the latest advances in robot intelligence technology and its applications.

RiTA 2020: Proceedings of the 8th International Conference on Robot Intelligence Technology and Applications (Lecture Notes in Mechanical Engineering)

by Esyin Chew Anwar P. P. Abdul Majeed Pengcheng Liu Jon Platts Hyun Myung Junmo Kim Jong-Hwan Kim

This book gathers the Proceedings of the 8th International Conference on Robot Intelligence Technology and Applications (RITA 2020). The areas covered include: Instrumentation and Control, Automation, Autonomous Systems, Biomechatronics and Rehabilitation Engineering, Intelligent Systems, Machine Learning, Mobile Robotics, Social Robotics and Humanoid Robotics, Sensors and Actuators, and Machine Vision, as well as Signal and Image Processing. As a valuable asset, the book offers researchers and practitioners a timely overview of the latest advances in robot intelligence technology and its applications.

River Sand Mining Modelling and Sustainable Practice: The Kangsabati River, India (Environmental Science and Engineering)

by Raj Kumar Bhattacharya Nilanjana Das Chatterjee

Worldwide demand for sand and gravel is increasing daily, as the need for these materials continues to rise, for example in the construction sector, in land filling and for transportation sector based infrastructural projects. This results in over-extraction of sand from channel beds, and hampers the natural renewal of sediment, geological setup and morphological processes of the riverine system. In India, illegal sand mining (of alluvial channels) and gravel mining (of perennial channels) are two anthropogenic issues that negatively affect the sustainable drainage system. Along the Kangsabati River in India, the consequences of sand mining are very serious. The construction of Mukutmonipur Dam (1958) on the river causes huge sediment deposition along the middle and downstream areas, these same areas are also intensely mined for sand (instream and on the flood plain). Geospatial models are applied in order to better understand the state and the resilience of stream hydraulics, morphological and river ecosystem variables during pre-mining and post-mining stages, using micro-level datasets of the Kangsabati River. The book also includes practicable measures to minimize the environmental consequences of instream mining in respect to optimum sand mining. It discusses the threshold limits of each variable in stream hydraulics, morphological and river ecological regime, and also discusses the most affected variables. Consequently, all outputs will be very useful for students, researchers, academicians, decision makers and practitioners and will facilitate applying these techniques to create models for other river basins.

RMAN Recipes for Oracle Database 12c: A Problem-Solution Approach

by Darl Kuhn Arup Nanda Sam Alapati

RMAN Recipes for Oracle Database 12c is an example-driven approach to the Oracle database administrator's #1 job responsibility: Be able to recover the database. Of all the things you are responsible for as database administrator, nothing is more important than the data itself. Like it or not, the fearsome responsibility of protecting your organization's most critical data falls squarely upon your shoulders: Lose that data and your company could fail. Lose that data and you could be out of a job. Oracle's flagship database product fortunately implements a wide-ranging feature set to aid you in the all-important task of safeguarding against data loss. Recovery Manager, or RMAN, is at the heart of that feature set, and is the tool most-often used to initiate database backup and recovery operations. In this book, well-known authors and database experts Darl Kuhn, Sam Alapati, and Arup Nanda have created a set of examples encompassing the gamut of backup and recovery tasks that you might need to perform. Sometimes, especially when the heat is on, a good example is what you need to get started towards a solution. RMAN Recipes for Oracle Database 12c delivers. It'll be the book you reach for when that dreaded call comes in at 3:00am some dreary morning. It'll be the book that lets you sleep at night knowing that no matter what transpires, that you've done your job well and can recover from any outage. RMAN Recipes for Oracle Database 12c gets right to the point with quick and easy-to-read, step-by-step solutions that can help you backup and recover your data with confidence.

RNA-seq Data Analysis: A Practical Approach (Chapman & Hall/CRC Computational Biology Series)

by Eija Korpelainen Jarno Tuimala Panu Somervuo Mikael Huss Garry Wong

The State of the Art in Transcriptome AnalysisRNA sequencing (RNA-seq) data offers unprecedented information about the transcriptome, but harnessing this information with bioinformatics tools is typically a bottleneck. RNA-seq Data Analysis: A Practical Approach enables researchers to examine differential expression at gene, exon, and transcript le

RNA Bioinformatics

by Ernesto Picardi

This volume provides an overview of RNA bioinformatics methodologies, including basic strategies to predict secondary and tertiary structures, and novel algorithms based on massive RNA sequencing. Interest in RNA bioinformatics has rapidly increased thanks to the recent high-throughput sequencing technologies allowing scientists to investigate complete transcriptomes at single nucleotide resolution. Adopting advanced computational technics, scientists are now able to conduct more in-depth studies and present them to you in this book. Written in the highly successful Methods of Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and equipment, step-by-step, readily reproducible bioinformatics protocols, and key tips to avoid known pitfalls. Authoritative and practical, RNA Bioinformatics seeks to aid scientists in the further study of bioinformatics and computational biology of RNA.

RNA Sequence, Structure, and Function: Computational and Bioinformatic Methods

by Jan Gorodkin Walter L. Ruzzo

The existence of genes for RNA molecules not coding for proteins (ncRNAs) has been recognized since the 1950's, but until recently, aside from the critically important ribosomal and transfer RNA genes, most focus has been on protein coding genes. However, a long series of striking discoveries, from RNA's ability to carry out catalytic function, to discovery of riboswitches, microRNAs and other ribo-regulators performing critical tasks in essentially all living organisms, has created a burgeoning interest in this primordial component of the biosphere. However, the structural characteristics and evolutionary constraints on RNA molecules are very different from those of proteins, necessitating development of a completely new suite of informatic tools to address these challenges. In RNA Sequence, Structure, Function: Computational and Bioinformatic Methods, expert researchers in the field describe a substantial and relevant fraction of these methodologies from both practical and computational/algorithmic perspectives. Focusing on both of these directions addresses both the biologist interested in knowing more about RNA bioinformatics as well as the bioinformaticist interested in more detailed aspects of the algorithms. Written in the highly successful Methods in Molecular Biology series format, the chapters include the kind of detailed description and implementation advice that is crucial for getting optimal results. Thorough and intuitive, RNA Sequence, Structure, Function: Computational and Bioinformatic Methods aids scientists in continuing to study key methods and principles of RNA bioinformatics.

The Road Ahead

by Bill Gates Nathan Myhrvold Peter Rinearson

In this book the software pioneer describes how emerging technologies will transform human existence in unprecedented ways.

Road Map for Sliding Mode Control Design (SpringerBriefs in Mathematics)

by Yury V. Orlov Andrey Polyakov Vadim Utkin Alex Poznyak

This book is devoted to control of finite and infinite dimensional processes with continuous-time and discrete time control, focusing on suppression problems and new methods of adaptation applicable for systems with sliding motions only. Special mathematical methods are needed for all the listed control tasks. These methods are addressed in the initial chapters, with coverage of the definition of the multidimensional sliding modes, the derivation of the differential equations of those motions, and the existence conditions. Subsequent chapters discusses various areas of further research. The book reflects the consensus view of the authors regarding the current status of SMC theory. It is addressed to a broad spectrum of engineers and theoreticians working in diverse areas of control theory and applications. It is well suited for use in graduate and postgraduate courses in such university programs as Electrical Engineering, Control of Nonlinear Systems, and Mechanical Engineering.

Refine Search

Showing 49,276 through 49,300 of 59,655 results