Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Choose an application
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.
Engineering. --- Computer security. --- Computational intelligence. --- Electrical engineering. --- Computational Intelligence. --- Communications Engineering, Networks. --- Systems and Data Security. --- Computer networks --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Intelligence, Computational --- Artificial intelligence --- Electric engineering --- Engineering --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer security --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security – IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.
Electrical engineering --- Applied physical engineering --- Mass communications --- Computer architecture. Operating systems --- Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- cloud computing --- informatica --- computerbeveiliging --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- elektrotechniek --- communicatietechnologie --- AI (artificiële intelligentie)
Choose an application
This book is a collection of published articles from the Sensors Special Issue on "Convergence of Intelligent Data Acquisition and Advanced Computing Systems". It includes extended versions of the conference contributions from the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2019), Metz, France, as well as external contributions.
Technology: general issues --- Energy industries & utilities --- automotive --- current --- electric power train --- electric vehicle --- embedded systems --- delay --- detection --- distributed systems --- measurements --- power train --- sensor --- signals --- time delay estimation --- unmanned aerial vehicles --- wireless sensor networks --- intelligent data processing --- trajectory planning --- relevant data extraction --- data consensus --- Internet of Things --- precision agriculture --- system identification --- smart building --- artificial neural network --- energy efficiency --- black box modeling --- educational robotics --- data acquisition --- sensors --- ROS --- STEM --- CNN (Convolutional neural networks) --- deep learning --- pavement defects --- residual connection --- attention gate --- atrous spatial pyramid pooling --- intelligent charging --- demand response --- linear programming --- optimization --- smart parking --- smart grid --- ODE Solver --- OpenCL --- Parareal --- parallel/multi-core computing --- sensing systems --- heterogenous embedded systems --- deep sparse auto-encoders --- medical diagnosis --- linear model --- data classification --- PSO algorithm --- safety-related system --- component --- FPGA-designing --- logical and power-oriented checkability --- hidden faults --- clock signal --- consumed and dissipated power --- temperature and current consumption sensors --- n/a
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book is a collection of published articles from the Sensors Special Issue on "Convergence of Intelligent Data Acquisition and Advanced Computing Systems". It includes extended versions of the conference contributions from the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2019), Metz, France, as well as external contributions.
automotive --- current --- electric power train --- electric vehicle --- embedded systems --- delay --- detection --- distributed systems --- measurements --- power train --- sensor --- signals --- time delay estimation --- unmanned aerial vehicles --- wireless sensor networks --- intelligent data processing --- trajectory planning --- relevant data extraction --- data consensus --- Internet of Things --- precision agriculture --- system identification --- smart building --- artificial neural network --- energy efficiency --- black box modeling --- educational robotics --- data acquisition --- sensors --- ROS --- STEM --- CNN (Convolutional neural networks) --- deep learning --- pavement defects --- residual connection --- attention gate --- atrous spatial pyramid pooling --- intelligent charging --- demand response --- linear programming --- optimization --- smart parking --- smart grid --- ODE Solver --- OpenCL --- Parareal --- parallel/multi-core computing --- sensing systems --- heterogenous embedded systems --- deep sparse auto-encoders --- medical diagnosis --- linear model --- data classification --- PSO algorithm --- safety-related system --- component --- FPGA-designing --- logical and power-oriented checkability --- hidden faults --- clock signal --- consumed and dissipated power --- temperature and current consumption sensors --- n/a
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book is a collection of published articles from the Sensors Special Issue on "Convergence of Intelligent Data Acquisition and Advanced Computing Systems". It includes extended versions of the conference contributions from the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2019), Metz, France, as well as external contributions.
Technology: general issues --- Energy industries & utilities --- automotive --- current --- electric power train --- electric vehicle --- embedded systems --- delay --- detection --- distributed systems --- measurements --- power train --- sensor --- signals --- time delay estimation --- unmanned aerial vehicles --- wireless sensor networks --- intelligent data processing --- trajectory planning --- relevant data extraction --- data consensus --- Internet of Things --- precision agriculture --- system identification --- smart building --- artificial neural network --- energy efficiency --- black box modeling --- educational robotics --- data acquisition --- sensors --- ROS --- STEM --- CNN (Convolutional neural networks) --- deep learning --- pavement defects --- residual connection --- attention gate --- atrous spatial pyramid pooling --- intelligent charging --- demand response --- linear programming --- optimization --- smart parking --- smart grid --- ODE Solver --- OpenCL --- Parareal --- parallel/multi-core computing --- sensing systems --- heterogenous embedded systems --- deep sparse auto-encoders --- medical diagnosis --- linear model --- data classification --- PSO algorithm --- safety-related system --- component --- FPGA-designing --- logical and power-oriented checkability --- hidden faults --- clock signal --- consumed and dissipated power --- temperature and current consumption sensors
Listing 1 - 9 of 9 |
Sort by
|