SDL 2017: Model-Driven Engineering for Future Internet
Title | SDL 2017: Model-Driven Engineering for Future Internet PDF eBook |
Author | Tibor Csöndes |
Publisher | Springer |
Pages | 184 |
Release | 2017-09-25 |
Genre | Computers |
ISBN | 3319680153 |
This book constitutes the proceedings of the 18th International System Design Language Forum, SDL 2017, held in Budapest, Hungary, in October 2017. The 10 full papers presented in this volume were carefully reviewed and selected from 17 submissions. The selected papers cover a wide spectrum of topics related to system design languages ranging from the system design language usage to UML and GRL models; model-driven engineering of database queries; network service design and regression testing; and modeling for Internet of Things (IoT) data processing.
Internet of Things, Threats, Landscape, and Countermeasures
Title | Internet of Things, Threats, Landscape, and Countermeasures PDF eBook |
Author | Stavros Shiaeles |
Publisher | CRC Press |
Pages | 357 |
Release | 2021-04-29 |
Genre | Computers |
ISBN | 1000380610 |
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.
Advances in Model and Data Engineering in the Digitalization Era
Title | Advances in Model and Data Engineering in the Digitalization Era PDF eBook |
Author | Philippe Fournier-Viger |
Publisher | Springer Nature |
Pages | 227 |
Release | 2023-01-09 |
Genre | Computers |
ISBN | 3031231198 |
This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 11th International Conference on Model and Data Engineering, MEDI 2022, held in Cairo, Egypt, in November 2022. The 11 short papers presented were selected from the total of 65 submissions. This volume also contains the 4 accepted papers from the DETECT 2022 workshop, held at MEDI 2022. The volume focuses on advances in data management and modelling, including topics such as data models, data processing, database theory, database systems technology, and advanced database applications.
Tools and Technologies for the Development of Cyber-Physical Systems
Title | Tools and Technologies for the Development of Cyber-Physical Systems PDF eBook |
Author | Balandin, Sergey |
Publisher | IGI Global |
Pages | 344 |
Release | 2019-12-27 |
Genre | Computers |
ISBN | 1799819760 |
With the continual development of professional industries in today’s modernized world, certain technologies have become increasingly applicable. Cyber-physical systems, specifically, are a mechanism that has seen rapid implementation across numerous fields. This is a technology that is constantly evolving, so specialists need a handbook of research that keeps pace with the advancements and methodologies of these devices. Tools and Technologies for the Development of Cyber-Physical Systems is an essential reference source that discusses recent advancements of cyber-physical systems and its application within the health, information, and computer science industries. Featuring research on topics such as autonomous agents, power supply methods, and software assessment, this book is ideally designed for data scientists, technology developers, medical practitioners, computer engineers, researchers, academicians, and students seeking coverage on the development and various applications of cyber-physical systems.
Risks and Security of Internet and Systems
Title | Risks and Security of Internet and Systems PDF eBook |
Author | Slim Kallel |
Publisher | Springer Nature |
Pages | 381 |
Release | 2020-02-28 |
Genre | Computers |
ISBN | 3030415686 |
This book constitutes the revised selected papers from the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS 2019, held in Hammamet, Tunisia, in October 2019. The 20 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They cover diverse research themes that range from classic topics, such as risk analysis and management; access control and permission; secure embedded systems; network and cloud security; information security policy; data protection and machine learning for security; distributed detection system and blockchain.
Applied Data Science
Title | Applied Data Science PDF eBook |
Author | Martin Braschler |
Publisher | Springer |
Pages | 464 |
Release | 2019-06-13 |
Genre | Computers |
ISBN | 3030118215 |
This book has two main goals: to define data science through the work of data scientists and their results, namely data products, while simultaneously providing the reader with relevant lessons learned from applied data science projects at the intersection of academia and industry. As such, it is not a replacement for a classical textbook (i.e., it does not elaborate on fundamentals of methods and principles described elsewhere), but systematically highlights the connection between theory, on the one hand, and its application in specific use cases, on the other. With these goals in mind, the book is divided into three parts: Part I pays tribute to the interdisciplinary nature of data science and provides a common understanding of data science terminology for readers with different backgrounds. These six chapters are geared towards drawing a consistent picture of data science and were predominantly written by the editors themselves. Part II then broadens the spectrum by presenting views and insights from diverse authors – some from academia and some from industry, ranging from financial to health and from manufacturing to e-commerce. Each of these chapters describes a fundamental principle, method or tool in data science by analyzing specific use cases and drawing concrete conclusions from them. The case studies presented, and the methods and tools applied, represent the nuts and bolts of data science. Finally, Part III was again written from the perspective of the editors and summarizes the lessons learned that have been distilled from the case studies in Part II. The section can be viewed as a meta-study on data science across a broad range of domains, viewpoints and fields. Moreover, it provides answers to the question of what the mission-critical factors for success in different data science undertakings are. The book targets professionals as well as students of data science: first, practicing data scientists in industry and academia who want to broaden their scope and expand their knowledge by drawing on the authors’ combined experience. Second, decision makers in businesses who face the challenge of creating or implementing a data-driven strategy and who want to learn from success stories spanning a range of industries. Third, students of data science who want to understand both the theoretical and practical aspects of data science, vetted by real-world case studies at the intersection of academia and industry.
Computer and Cyber Security
Title | Computer and Cyber Security PDF eBook |
Author | Brij B. Gupta |
Publisher | CRC Press |
Pages | 666 |
Release | 2018-11-19 |
Genre | Business & Economics |
ISBN | 0429756313 |
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.