Listing 1 - 8 of 8 |
Sort by
|
Choose an application
The book focuses on a novel application of Intelligent Systems for supporting the operation and maintenance of power systems or other technical facilities within wind farms. Indicating a different perception of the reliability of wind farm facilities led to the possibility of extending the operation lifetime and operational readiness of wind farm equipment. Additionally, the presented approach provides a basis for extending its application to the testing and analysis of other technical facilities.
information quality (IQ) --- modeling --- uncertainty --- information and communication technologies (ICT) --- intrusion detection system --- detection circuit --- temperature --- tripping thresholds --- climatic chamber --- temperature characteristics --- diagnosis reliability --- fire alarm system --- critical infrastructure --- reliability requirements --- construction facilities --- electronic security system --- electromagnetic interference --- operation --- video surveillance --- railway safety systems --- rail safety systems --- reliability --- servicing process --- intelligent systems --- wind farm device --- diagnostic process --- expert system --- knowledge base --- neural networks --- diagnostic information
Choose an application
The book focuses on a novel application of Intelligent Systems for supporting the operation and maintenance of power systems or other technical facilities within wind farms. Indicating a different perception of the reliability of wind farm facilities led to the possibility of extending the operation lifetime and operational readiness of wind farm equipment. Additionally, the presented approach provides a basis for extending its application to the testing and analysis of other technical facilities.
Technology: general issues --- History of engineering & technology --- information quality (IQ) --- modeling --- uncertainty --- information and communication technologies (ICT) --- intrusion detection system --- detection circuit --- temperature --- tripping thresholds --- climatic chamber --- temperature characteristics --- diagnosis reliability --- fire alarm system --- critical infrastructure --- reliability requirements --- construction facilities --- electronic security system --- electromagnetic interference --- operation --- video surveillance --- railway safety systems --- rail safety systems --- reliability --- servicing process --- intelligent systems --- wind farm device --- diagnostic process --- expert system --- knowledge base --- neural networks --- diagnostic information
Choose an application
The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.
Technology: general issues --- normalized cross-correlation --- fast algorithm --- first-order moment --- systolic array --- multiplication complexity --- IoT --- sustainability --- hybrid RAM disk --- direct byte read --- secondary storage --- operating system --- PM2.5 concentration estimation --- digital image processing --- automatic region of interest selection --- data exclusion --- linear regression --- census transform --- sparse census transform --- disparity --- stereo vision --- data hiding --- multidimensional --- embedding efficiency --- mini-SuDoKu --- security --- NAND flash memory --- P/E cycle --- compression --- adaptive ECC --- RAID scattering --- stripe log --- parity --- secret image sharing --- maze matrix --- cheat detection --- cheater identification --- controller area network --- intrusion detection system --- in-vehicle network security --- machine learning --- hierarchical approach --- anomaly detection --- MLHC --- IWSNs --- error models --- IEEE 802.15.4 --- second-order Markov chain --- OpenWSN --- transmission reliability --- certificateless signature --- aggregate signature --- arbitrated signature --- public key replace attack --- epidemic management --- GNSS/GPS --- infectious disease --- isolation --- social networking service --- hot spot --- adaptive data rate (ADR) --- transmit power control (TPC) --- time division multiple access (TDMA) --- wireless sensor network (WSN) --- power consumption --- Internet of Things (IoT) --- n/a
Choose an application
The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.
normalized cross-correlation --- fast algorithm --- first-order moment --- systolic array --- multiplication complexity --- IoT --- sustainability --- hybrid RAM disk --- direct byte read --- secondary storage --- operating system --- PM2.5 concentration estimation --- digital image processing --- automatic region of interest selection --- data exclusion --- linear regression --- census transform --- sparse census transform --- disparity --- stereo vision --- data hiding --- multidimensional --- embedding efficiency --- mini-SuDoKu --- security --- NAND flash memory --- P/E cycle --- compression --- adaptive ECC --- RAID scattering --- stripe log --- parity --- secret image sharing --- maze matrix --- cheat detection --- cheater identification --- controller area network --- intrusion detection system --- in-vehicle network security --- machine learning --- hierarchical approach --- anomaly detection --- MLHC --- IWSNs --- error models --- IEEE 802.15.4 --- second-order Markov chain --- OpenWSN --- transmission reliability --- certificateless signature --- aggregate signature --- arbitrated signature --- public key replace attack --- epidemic management --- GNSS/GPS --- infectious disease --- isolation --- social networking service --- hot spot --- adaptive data rate (ADR) --- transmit power control (TPC) --- time division multiple access (TDMA) --- wireless sensor network (WSN) --- power consumption --- Internet of Things (IoT) --- n/a
Choose an application
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection
Choose an application
The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field.
Technology: general issues --- normalized cross-correlation --- fast algorithm --- first-order moment --- systolic array --- multiplication complexity --- IoT --- sustainability --- hybrid RAM disk --- direct byte read --- secondary storage --- operating system --- PM2.5 concentration estimation --- digital image processing --- automatic region of interest selection --- data exclusion --- linear regression --- census transform --- sparse census transform --- disparity --- stereo vision --- data hiding --- multidimensional --- embedding efficiency --- mini-SuDoKu --- security --- NAND flash memory --- P/E cycle --- compression --- adaptive ECC --- RAID scattering --- stripe log --- parity --- secret image sharing --- maze matrix --- cheat detection --- cheater identification --- controller area network --- intrusion detection system --- in-vehicle network security --- machine learning --- hierarchical approach --- anomaly detection --- MLHC --- IWSNs --- error models --- IEEE 802.15.4 --- second-order Markov chain --- OpenWSN --- transmission reliability --- certificateless signature --- aggregate signature --- arbitrated signature --- public key replace attack --- epidemic management --- GNSS/GPS --- infectious disease --- isolation --- social networking service --- hot spot --- adaptive data rate (ADR) --- transmit power control (TPC) --- time division multiple access (TDMA) --- wireless sensor network (WSN) --- power consumption --- Internet of Things (IoT)
Choose an application
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
Technology: general issues --- History of engineering & technology --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing
Listing 1 - 8 of 8 |
Sort by
|