Описание: Emerging as an effective alternative to organisation-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software.Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.
Автор: Theo Tryfonas; Ioannis Askoxylakis Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319076191 ISBN-13(EAN): 9783319076195 Издательство: Springer Рейтинг: Цена: 11598.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas.
Автор: Alexander B. Sideridis; Zoe Kardasiadou; Constanti Название: E-Democracy, Security, Privacy and Trust in a Digital World ISBN: 3319117092 ISBN-13(EAN): 9783319117096 Издательство: Springer Рейтинг: Цена: 8106.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The papers are organized in topical sections on security, privacy;
Автор: Francesco Bonchi; Elena Ferrari; Wei Jiang; Bradle Название: Privacy, Security, and Trust in KDD ISBN: 3642017177 ISBN-13(EAN): 9783642017179 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008.
Автор: Zaigham Mahmood Название: Guide to Ambient Intelligence in the IoT Environment ISBN: 3030041727 ISBN-13(EAN): 9783030041724 Издательство: Springer Рейтинг: Цена: 7685.00 р. Наличие на складе: Поставка под заказ.
Описание:
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their immediate needs and requirements. The key factor is the presence of intelligence and decision-making capabilities in IoT environments. The underlying technologies include pervasive computing, ubiquitous communication, seamless connectivity of smart devices, sensor networks, artificial intelligence (AI), machine learning (ML) and context-aware human-computer interaction (HCI). AmI applications and scenarios include smart homes, autonomous self-driving vehicles, healthcare systems, smart roads, the industry sector, smart facilities management, the education sector, emergency services, and many more. The advantages of AmI in the IoT environment are extensive. However, as for any new technological paradigm, there are also many open issues and limitations.
This book discusses the AmI element of the IoT and the relevant principles, frameworks, and technologies in particular, as well as the benefits and inherent limitations. It reviews the state of the art of current developments relating to smart spaces and AmI-based IoT environments. Written by leading international researchers and practitioners, the majority of the contributions focus on device connectivity, pervasive computing and context modelling (including communication, security, interoperability, scalability, and adaptability). The book presents cutting-edge research, current trends, and case studies, as well as suggestions to further our understanding and the development and enhancement of the AmI-IoT vision.
Автор: Fortino Название: Interoperability, Safety and Security in IoT ISBN: 3319937960 ISBN-13(EAN): 9783319937960 Издательство: Springer Рейтинг: Цена: 5870.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017.
Автор: Ali Dehghantanha; Kim-Kwang Raymond Choo Название: Handbook of Big Data and IoT Security ISBN: 3030105423 ISBN-13(EAN): 9783030105426 Издательство: Springer Рейтинг: Цена: 20962.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
Автор: Nathalie Mitton; Hakima Chaouchi; Thomas Noel; Tho Название: Interoperability, Safety and Security in IoT ISBN: 3319527266 ISBN-13(EAN): 9783319527260 Издательство: Springer Рейтинг: Цена: 5870.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Comparative Analysis of Opportunistic Communication Technologies.- Technical Overview of F-Interop.- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs.- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT.- Providing Interoperability for Autonomic Control of Connected Devices.- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications.- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things.- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT.- On the Performance of Key Pre-distribution for RPL-based IoT Networks.- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things.- Framework of Cyber Attack Attribution Based on Threat Intelligence.- UML Modeling of Cross-layer Attack in Wireless Sensor Networks.- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications.- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT.- Framework of Cyber Attack Attribution Based on Threat Intelligence.
Автор: Milan Petkovic; Willem Jonker Название: Security, Privacy, and Trust in Modern Data Management ISBN: 3642089267 ISBN-13(EAN): 9783642089268 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services.
Автор: Theo Tryfonas Название: Human Aspects of Information Security, Privacy and Trust ISBN: 3319584596 ISBN-13(EAN): 9783319584591 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Clinical and Health Information Systems.- Mobile-Application based Cognitive Behavior Therapy (CBT) for Identifying and Managing Depression and Anxiety.- The structure of clinical judgment making based on nurse's visual observation. -Towards a Clinical Support System for the Early Diagnosis of Sepsis. -APSEN: Pre-Screening Tool for Sleep Apnea in a Home Environment. - Tacit process for obtaining nursing skills: Focusing on nurse's sense of patients close to death.- Conversion of JPG Image into DICOM Image Format with One Click Tagging.- Eye Movement Differences between Novices and Expert Surgeons in Laparoscopic Surgery Simulator.- Evaluation Methods to Support Health Information Systems Development: a Framework Supported in Literature and Practical Experience. -Software Requirements Engineering in Digital Healthcare: A Case Study of the Diagnosis and Monitoring of Autism Spectrum Disorders in Children in the UK's National Health Service. - Compare the Receiver Operating Characteristic (ROC) and Linear Discriminant Analysis (LDA) for Acromegaly Detection by Three-Dimensional Facial Measurements.- Evaluation of Functionality and Usability on Diabetes Mobile Applications: A Systematic Literature Review.- Health and Aging. - Abductive cognitive support for (semantic) dementia persons.- Age and Computer Skill Level Difference in Aging-Centered Design: A Case Study of a Social Type Website. -Application and Effect of Media Therapy to the Recreational Activities at Group Homes Reduction of Emotional Pain of Elderly People with Dementia. -Investigation of Quantification of the Suitable Photos for Conversation Assistance for Elderly and Youth.- Generating Personalized Dialogue Towards Daily Counseling System for Home Dementia Care. -Color Affects the Usability of Smart Phone Icon for the Elderly. -Capturing Activities of Daily Living for Elderly at Home based on Environment Change and Speech Dialog.- F0 Feature Analysis of Communication between Elderly Individuals for Health Assessment. -A Study of Photographs as Communication Content for Intergenerational Conversation Support System. - Health Data Analytics and Visualization. - Measuring Insight Into Multi-dimensional Data from a Combination of a Scatterplot Matrix and a HyperSlice Visualization.- Effective visualization of long term health data to support behavior change. -That's so meta! Usability of a Hypergraph-based Discussion Model. - FlowChart Tool for Decision Making in Interdisciplinary Research Cooperation.- Using EEG Data Analytics to Measure Meditation. -Enhance the Use of Medical Wearables through Meaningful Data Analytics. - User-driven Semantic Classification for the Analysis of Abstract Health and Visualization Tasks.- EEG Features Extraction and Classification of Rifle Shooters in the Aiming Period. - Design for Safety.- Safety does not happen by accident, can gaming help improve occupational health and safety in organizations. - Autonomous robotic system for pipeline integrity inspection.- Interactive design of digital car dashboard interfaces. -Emergency Usability Lab - Concept to evaluate the usability of healthcare systems in emergencies.- Watch out! User-centered Feedback Design for a V2X-Smartphone App.- Safety Performance Evaluation Model for Airline Flying Fleets.- Deciphering Workers' Safety Attitudes by Sensing Gait Patterns.- Driving Process' Analysis and HUD design based on Conditional Autonomous Traffic Safety. -ECG Identification Based on PCA-RPROP.
Автор: Gerhard P. Hancke; Konstantinos Markantonakis Название: Radio Frequency Identification and IoT Security ISBN: 3319620231 ISBN-13(EAN): 9783319620237 Издательство: Springer Рейтинг: Цена: 7685.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Protocols.- Side channel and hardware.- Cards and tokens.- Proximity.- Communication.
Автор: Theo Tryfonas; Ioannis Askoxylakis Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319203754 ISBN-13(EAN): 9783319203751 Издательство: Springer Рейтинг: Цена: 12298.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Authentication.- Cybersecurity.- Privacy, security and user behaviour.- Security in social media and smart technologies.- Security Technologies.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru