Narrow your search
Listing 1 - 8 of 8
Sort by

Book
Intelligent Systems Supporting the Use of Energy Systems and Other Complex Technical Objects, Modeling, Testing and Analysis of Their Reliability in the Operation Process
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book focuses on a novel application of Intelligent Systems for supporting the operation and maintenance of power systems or other technical facilities within wind farms. Indicating a different perception of the reliability of wind farm facilities led to the possibility of extending the operation lifetime and operational readiness of wind farm equipment. Additionally, the presented approach provides a basis for extending its application to the testing and analysis of other technical facilities.


Book
Intelligent Systems Supporting the Use of Energy Systems and Other Complex Technical Objects, Modeling, Testing and Analysis of Their Reliability in the Operation Process
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book focuses on a novel application of Intelligent Systems for supporting the operation and maintenance of power systems or other technical facilities within wind farms. Indicating a different perception of the reliability of wind farm facilities led to the possibility of extending the operation lifetime and operational readiness of wind farm equipment. Additionally, the presented approach provides a basis for extending its application to the testing and analysis of other technical facilities.


Book
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)
Authors: --- --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.

Keywords

Technology: general issues --- normalized cross-correlation --- fast algorithm --- first-order moment --- systolic array --- multiplication complexity --- IoT --- sustainability --- hybrid RAM disk --- direct byte read --- secondary storage --- operating system --- PM2.5 concentration estimation --- digital image processing --- automatic region of interest selection --- data exclusion --- linear regression --- census transform --- sparse census transform --- disparity --- stereo vision --- data hiding --- multidimensional --- embedding efficiency --- mini-SuDoKu --- security --- NAND flash memory --- P/E cycle --- compression --- adaptive ECC --- RAID scattering --- stripe log --- parity --- secret image sharing --- maze matrix --- cheat detection --- cheater identification --- controller area network --- intrusion detection system --- in-vehicle network security --- machine learning --- hierarchical approach --- anomaly detection --- MLHC --- IWSNs --- error models --- IEEE 802.15.4 --- second-order Markov chain --- OpenWSN --- transmission reliability --- certificateless signature --- aggregate signature --- arbitrated signature --- public key replace attack --- epidemic management --- GNSS/GPS --- infectious disease --- isolation --- social networking service --- hot spot --- adaptive data rate (ADR) --- transmit power control (TPC) --- time division multiple access (TDMA) --- wireless sensor network (WSN) --- power consumption --- Internet of Things (IoT) --- n/a


Book
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)
Authors: --- --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.


Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.


Book
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)
Authors: --- --- ---
Year: 2021 Publisher: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.


Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.


Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
Authors: --- --- ---
ISBN: 3642392342 3642392350 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Keywords

Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing

Listing 1 - 8 of 8
Sort by