Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps Covers key technical topics and provides readers with a complete understanding of the most current research findings Includes discussions on future research directions and challenges
Cloud computing. --- Mobile computing. --- Electronic data processing --- Context-aware computing --- Portable computers --- Web services --- Distributed processing
Choose an application
This book constitutes the proceedings of the 17th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2017, held in Helsinki, Finland, in August 2017. The 25 full papers presented were carefully reviewed and selected from 117 submissions. They cover topics such as parallel and distributed architectures; software systems and programming models; distributed and network-based computing; big data and its applications; parallel and distributed algorithms; applications of parallel and distributed computing; service dependability and security in distributed and parallel systems; service dependability and security in distributed and parallel systems; performance modeling and evaluation. This volume also includes 41 papers of four workshops, namely: the 4th International Workshop on Data, Text, Web, and Social Network Mining (DTWSM 2017), the 5th International Workshop on Parallelism in Bioinformatics (PBio 2017) , the First International Workshop on Distributed Autonomous Computing in Smart City (DACSC 2017), and the Second International Workshop on Ultrascale Computing for Early Researchers (UCER 2017). .
Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Foundations --- Distributed processing --- Computer software. --- Software, Computer --- Computer systems --- Parallel processing (Electronic computers) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications.
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Data Encryption. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer science
Choose an application
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity .
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Artificial intelligence. --- Computer Science. --- Security. --- Systems and Data Security. --- Information Systems and Communication Service. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Cybernetics --- Calculators --- Cyberspace --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Data protection. --- Information systems. --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps Covers key technical topics and provides readers with a complete understanding of the most current research findings Includes discussions on future research directions and challenges
Cloud computing. --- Mobile computing. --- Computer crimes --- Forensic sciences. --- Mobile communication systems. --- Mobile device forensics. --- Investigation.
Choose an application
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.
Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Artificial Intelligence (incl. Robotics). --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Foundations --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Artificial Intelligence. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Cloud computing --- Ubiquitous computing --- Computer security --- Green technology --- Earth-friendly technology --- Environmental technology --- Technology --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Data centers
Choose an application
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges. Presents the most current and leading edge research on mobile security and privacy, featuring a panel of top experts in the field Provides a strategic and international overview of the security issues surrounding mobile technologies Covers key technical topics and provides readers with a complete understanding of the most current research findings along with future research directions and challenges Enables practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding the implementation of mobile technology security and privacy initiatives
Wireless communication systems --- Mobile communication systems --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Vehicles --- Vehicular communication systems --- Radio --- Communication systems --- Mobile computing
Listing 1 - 7 of 7 |
Sort by
|