ICSA 2019

ICSA 2019 PDF Author: Farit Mochamad Afendi
Publisher: European Alliance for Innovation
ISBN: 1631902202
Category : Education
Languages : en
Pages : 610

Get Book Here

Book Description
This conference serves as a means of presenting and discussing various research results among academics, researchers, and practitioners in the fields of statistics, analytics, computing, data science, and its application. Based on 110 papers that have been presented there are three main topics as the focus of the discussion, namely Statistical Modeling, Predictive Analytics, and Pattern Learning. The approach is in the form of a study to obtain a valid methodology for extracting, collecting, storing, analyzing, and visualizing data including those derived from big data. The application studies cover various fields such as agriculture, climate, energy, industry, business, social, and so on. The conference is expected to be able to provide solutions to various problems in various fields through statistical and analytical approaches.

Digital Transformation

Digital Transformation PDF Author: Birgit Vogel-Heuser
Publisher: Springer Nature
ISBN: 3662650045
Category : Computers
Languages : en
Pages : 522

Get Book Here

Book Description
Digital Transformation in Industry 4.0/5.0 requires the effective and efficient application of digitalization technologies in the area of production systems. This book elaborates on concepts, techniques, and technologies from computer science in the context of Industry 4.0/5.0 and demonstrates their possible applications. Thus, the book serves as an orientation but also as a reference work for experts in the field of Industry 4.0/5.0 to successfully advance digitization in their companies.

Context-based Access Control and Attack Modelling and Analysis

Context-based Access Control and Attack Modelling and Analysis PDF Author: Walter, Maximilian
Publisher: KIT Scientific Publishing
ISBN: 3731513625
Category :
Languages : en
Pages : 350

Get Book Here

Book Description
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.

Applied Cryptography and Network Security

Applied Cryptography and Network Security PDF Author: Giuseppe Ateniese
Publisher: Springer Nature
ISBN: 3031092341
Category : Computers
Languages : en
Pages : 916

Get Book Here

Book Description
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

S3D Dashboard

S3D Dashboard PDF Author: Florian Weidner
Publisher: Springer Nature
ISBN: 3658351470
Category : Technology & Engineering
Languages : en
Pages : 217

Get Book Here

Book Description
Over the last decades, the interior of cars has been constantly changing. A promising, yet unexplored, modality are large stereoscopic 3D (S3D) dashboards. Replacing the traditional car dashboard with a large display and applying binocular depth cues, such a user interface (UI) could provide novel possibilities for research and industry. In this book, the author introduces a development environment for such a user interface. With it, he performed several driving simulator experiments and shows that S3D can be used across the dashboard to support menu navigation and to highlight elements without impairing driving performance. The author demonstrates that S3D has the potential to promote safe driving when used in combination with virtual agents during conditional automated driving. Further, he present results indicating that S3D navigational cues improve take-over maneuvers in conditional automated vehicles. Finally, investigating the domain of highly automated driving, he studied how users would interact with and manipulate S3D content on such dashboards and present a user-defined gesture set.

Computer Security

Computer Security PDF Author: Sokratis Katsikas
Publisher: Springer Nature
ISBN: 3030643301
Category : Computers
Languages : en
Pages : 275

Get Book Here

Book Description
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Proceeding of the 3rd International Conference on Electronics, Biomedical Engineering, and Health Informatics

Proceeding of the 3rd International Conference on Electronics, Biomedical Engineering, and Health Informatics PDF Author: Triwiyanto Triwiyanto
Publisher: Springer Nature
ISBN: 9819902487
Category : Technology & Engineering
Languages : en
Pages : 708

Get Book Here

Book Description
This book presents high-quality peer-reviewed papers from the International Conference on Electronics, Biomedical Engineering, and Health Informatics (ICEBEHI) 2022 held at Surabaya, Indonesia, virtually. The contents are broadly divided into three parts: (a) Electronics, (b) Biomedical Engineering, and (c) Health Informatics. The major focus is on emerging technologies and their applications in the domain of biomedical engineering. It includes papers based on original theoretical, practical, and experimental simulations, development, applications, measurements, and testing. Featuring the latest advances in the field of biomedical engineering applications, this book serves as a definitive reference resource for researchers, professors, and practitioners interested in exploring advanced techniques in the fields of electronics, biomedical engineering, and health informatics. The applications and solutions discussed here provide excellent reference material for future product development.

Blockchains

Blockchains PDF Author: Sushmita Ruj
Publisher: Springer Nature
ISBN: 3031321464
Category :
Languages : en
Pages : 621

Get Book Here

Book Description


Architectural Alignment of Access Control Requirements Extracted from Business Processes

Architectural Alignment of Access Control Requirements Extracted from Business Processes PDF Author: Pilipchuk, Roman
Publisher: KIT Scientific Publishing
ISBN: 3731512122
Category : Computers
Languages : en
Pages : 366

Get Book Here

Book Description
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

A Director's Guide to Governance in the Boardroom

A Director's Guide to Governance in the Boardroom PDF Author: Arturo Langa
Publisher: Routledge
ISBN: 1000570428
Category : Business & Economics
Languages : en
Pages : 449

Get Book Here

Book Description
This book is a practical guide for executive and non-executive directors and aspiring directors to lead, govern, and steer UK-based organisations to long-term sustainable success. In today’s turbulent environment, corporate governance is increasingly scrutinised, and this book will consider how directors can ‘bring the future forward’ with respect to responsible and ethical governance and leadership against the challenging political, environmental, and economic backdrop. While other books discuss UK corporate governance, this one uniquely demonstrates how the work of directors can build an organisation’s antifragility, and offers a view of stewardship approaches to every sector and type of UK organisation, from large premium listed companies to start-ups, the public sector, not-for-profits, partnerships, and family-owned and private-equity-backed organisations. Aspiring and experienced directors will each benefit from this book as well as those who provide board evaluation services, professional advisers, auditors, and those who provide training and other support for board members.