Author:
Publisher:
ISBN: 9781728141367
Category :
Languages : en
Pages :
Book Description
2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshops
Author:
Publisher:
ISBN: 9781728141367
Category :
Languages : en
Pages :
Book Description
Publisher:
ISBN: 9781728141367
Category :
Languages : en
Pages :
Book Description
2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshops
Author:
Publisher:
ISBN:
Category : Computer-aided software engineering
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computer-aided software engineering
Languages : en
Pages :
Book Description
Proceedings of Third International Conference on Computing and Communication Networks
Author: Giancarlo Fortino
Publisher: Springer Nature
ISBN: 9819726719
Category :
Languages : en
Pages : 809
Book Description
Publisher: Springer Nature
ISBN: 9819726719
Category :
Languages : en
Pages : 809
Book Description
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media
Author: Cyril Onwubiko
Publisher: Springer Nature
ISBN: 9811964149
Category : Science
Languages : en
Pages : 476
Book Description
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Publisher: Springer Nature
ISBN: 9811964149
Category : Science
Languages : en
Pages : 476
Book Description
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Theoretical Aspects of Software Engineering
Author: Cristina David
Publisher: Springer Nature
ISBN: 3031352572
Category : Computers
Languages : en
Pages : 375
Book Description
This book constitutes the proceedings of the 17th International Conference on Theoretical Aspects of Software Engineering, TASE 2023, held in Bristol, UK, July 4–6, 2023. The 19 full papers and 2 short papers included in this book were carefully reviewed and selected from 49 submissions. They cover the following areas: distributed and concurrent systems; cyber-physical systems; embedded and real-time systems; object-oriented systems; quantum computing; formal verification and program semantics; static analysis; formal methods; verification and testing for AI systems; and AI for formal methods.
Publisher: Springer Nature
ISBN: 3031352572
Category : Computers
Languages : en
Pages : 375
Book Description
This book constitutes the proceedings of the 17th International Conference on Theoretical Aspects of Software Engineering, TASE 2023, held in Bristol, UK, July 4–6, 2023. The 19 full papers and 2 short papers included in this book were carefully reviewed and selected from 49 submissions. They cover the following areas: distributed and concurrent systems; cyber-physical systems; embedded and real-time systems; object-oriented systems; quantum computing; formal verification and program semantics; static analysis; formal methods; verification and testing for AI systems; and AI for formal methods.
Software Architecture. ECSA 2022 Tracks and Workshops
Author: Thais Batista
Publisher: Springer Nature
ISBN: 3031368894
Category : Computers
Languages : en
Pages : 492
Book Description
This book constitutes the refereed proceedings of the tracks and workshops which complemented the 16th European Conference on Software Architecture, ECSA 2022, held in Prague, Czech Republic, in September 2022. The 26 full papers presented together with 4 short papers and 2 tutorial papers in this volume were carefully reviewed and selected from 61 submissions. Papers presented were accepted into the following tracks and workshops: Industry track; Tools and Demonstrations Track; Doctoral Symposium; Tutorials; 8th International Workshop on Automotive System/Software Architectures (WASA); 5th Context-Aware, Autonomous and Smart Architectures International Workshop (CASA); 6th International Workshop on Formal Approaches for Advanced Computing Systems (FAACS); 3rd Workshop on Systems, Architectures, and Solutions for Industry 4.0 (SASI4); 2nd International Workshop on Designing and Measuring Security in Software Architectures (DeMeSSA); 2nd International Workshop on Software Architecture and Machine Learning (SAML); 9th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon); 2nd International Workshop on Mining Software Repositories for Software Architecture (MSR4SA); and 1st International Workshop on Digital Twin Architecture (TwinArch).
Publisher: Springer Nature
ISBN: 3031368894
Category : Computers
Languages : en
Pages : 492
Book Description
This book constitutes the refereed proceedings of the tracks and workshops which complemented the 16th European Conference on Software Architecture, ECSA 2022, held in Prague, Czech Republic, in September 2022. The 26 full papers presented together with 4 short papers and 2 tutorial papers in this volume were carefully reviewed and selected from 61 submissions. Papers presented were accepted into the following tracks and workshops: Industry track; Tools and Demonstrations Track; Doctoral Symposium; Tutorials; 8th International Workshop on Automotive System/Software Architectures (WASA); 5th Context-Aware, Autonomous and Smart Architectures International Workshop (CASA); 6th International Workshop on Formal Approaches for Advanced Computing Systems (FAACS); 3rd Workshop on Systems, Architectures, and Solutions for Industry 4.0 (SASI4); 2nd International Workshop on Designing and Measuring Security in Software Architectures (DeMeSSA); 2nd International Workshop on Software Architecture and Machine Learning (SAML); 9th Workshop on Software Architecture Erosion and Architectural Consistency (SAEroCon); 2nd International Workshop on Mining Software Repositories for Software Architecture (MSR4SA); and 1st International Workshop on Digital Twin Architecture (TwinArch).
Computer Security. ESORICS 2023 International Workshops
Author: Sokratis Katsikas
Publisher: Springer Nature
ISBN: 3031542045
Category :
Languages : en
Pages : 518
Book Description
Publisher: Springer Nature
ISBN: 3031542045
Category :
Languages : en
Pages : 518
Book Description
Software Architecture
Author: Ilias Gerostathopoulos
Publisher: Springer Nature
ISBN: 3031166973
Category : Computers
Languages : en
Pages : 225
Book Description
This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022. The 9 full papers and 6 short papers were carefully selected from 47 submissions. In the Research Track, 11 full papers presented together with 5 short papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections as follows: components, APIs and interface management; architecting for data-driven systems; microservices and middleware; architecture modeling, design and decision making; architecture reconstruction and recovery.
Publisher: Springer Nature
ISBN: 3031166973
Category : Computers
Languages : en
Pages : 225
Book Description
This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022. The 9 full papers and 6 short papers were carefully selected from 47 submissions. In the Research Track, 11 full papers presented together with 5 short papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections as follows: components, APIs and interface management; architecting for data-driven systems; microservices and middleware; architecture modeling, design and decision making; architecture reconstruction and recovery.
Smart Log Data Analytics
Author: Florian Skopik
Publisher: Springer Nature
ISBN: 3030744507
Category : Computers
Languages : en
Pages : 210
Book Description
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for “online use”, not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
Publisher: Springer Nature
ISBN: 3030744507
Category : Computers
Languages : en
Pages : 210
Book Description
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for “online use”, not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
Proceedings of Ninth International Congress on Information and Communication Technology
Author: Xin-She Yang
Publisher: Springer Nature
ISBN: 9819750350
Category :
Languages : en
Pages : 644
Book Description
Publisher: Springer Nature
ISBN: 9819750350
Category :
Languages : en
Pages : 644
Book Description