ICCWS20 - Proceedings of the 15th International Conference on Cyber Warfare and Security

ICCWS20 - Proceedings of the 15th International Conference on Cyber Warfare and Security

Author: Brian Payne

Publisher: Acpil

ISBN: 1912764520

Category: Reference

Page: 658

View: 745

These proceedings represent the work of contributors to the 15th International Conference on Cyber Warfare and Security (ICCWS 2020), hosted by Old Dominion University (ODU), Norfolk, Virginia on 12-13 March 2020. The Conference Chair is Prof. Brian K. Payne and the Programme Chair is Prof. Hongyi Wu, both from Old Dominion University. ICCWS is now a well-established event on the academic research calendar and now in its 15th year the key aim remains the opportunity for participants to share ideas and meet the people who hold them. The scope of papers will ensure an interesting two days. The subjects covered illustrate the wide range of topics that fall into this important and ever-growing area of research. With an initial submission of 139 abstracts, after the double blind, peer review process there are 59 Academic research papers, 7 PhD research papers, 4 Masters Research papers, 1 non-academic paper and 1 work-in-progress paper published in these Conference Proceedings. These papers represent research from Australia, Canada, Czech Republic, Estonia, Finland, France, Germany, Ghana, Lesotho, Malaysia, Namibia, Nigeria, Norway, Portugal, South Africa, South Korea, Sweden, the Netherlands, and USA.

16th International Conference on Cyber Warfare and Security

16th International Conference on Cyber Warfare and Security

Author: Dr Juan Lopez Jr

Publisher: Academic Conferences Limited

ISBN: 9781912764884

Category: History

Page:

View: 654

These proceedings represent the work of contributors to the 16th International Conference on Cyber Warfare and Security (ICCWS 2021), hosted by joint collaboration of Tennessee Tech Cybersecurity Education, Research and Outreach Center (CEROC), Computer Science department and the Oak Ridge National Laboratory, Tennessee on 25-26 February 2021. The Conference Co-Chairs are Dr. Juan Lopez Jr, Oak Ridge National Laboratory, Tennessee, and Dr. Ambareen Siraj, Tennessee Tech’s Cybersecurity Education, Research and Outreach Center (CEROC), and the Program Chair is Dr. Kalyan Perumalla, from Oak Ridge National Laboratory, Tennessee.

International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI'2020)

International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI'2020)

Author: Jemal H. Abawajy

Publisher: Springer Nature

ISBN: 9783030802165

Category: Computational intelligence

Page: 296

View: 203

This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment sensors, blockchain, cloud computing, and health. In addition, the book also covers machine learning fundamentals such as feature selection. The book presents practical simulation results and different illustrations in different chapters for easy understanding of concepts and approaches. The types of contributions in the book are as follows: original research, survey, and theoretical insight that describe advancement in the adoption of technique for resolving the broad range of challenges. Researchers, undergraduates, postgraduates, and industry experts will find the book as a valuable resource that bridges theory and practice. .

Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3

Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3

Author: Kohei Arai

Publisher: Springer Nature

ISBN: 9783030899127

Category: Artificial intelligence

Page: 882

View: 828

This book provides the state-of-the-art intelligent methods and techniques for solving real world problems along with a vision of the future research. The sixth Future Technologies Conference 2021 was organized virtually and received a total of 531 submissions from academic pioneering researchers, scientists, industrial engineers, and students from all over the world. The submitted papers covered a wide range of important topics including but not limited to technology trends, computing, artificial intelligence, machine vision, communication, security, e-learning and ambient intelligence and their applications to the real world. After a double-blind peer-reviewed process, 191 submissions have been selected to be included in these proceedings. One of the meaningful and valuable dimensions of this conference is the way it brings together a large group of technology geniuses in one venue to not only present breakthrough research in future technologies but also to promote discussions and debate of relevant issues, challenges, opportunities, and research findings. We hope that readers find the volume interesting, exciting, and inspiring.

Advances in Cybersecurity Management

Advances in Cybersecurity Management

Author: Kevin Daimi

Publisher: Springer Nature

ISBN: 9783030713812

Category: Computers

Page: 497

View: 904

This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.

Progress in Intelligent Decision Science

Progress in Intelligent Decision Science

Author: Tofigh Allahviranloo

Publisher: Springer Nature

ISBN: 9783030665012

Category: Technology & Engineering

Page: 989

View: 668

This book contains the topics of artificial intelligence and deep learning that do have much application in real-life problems. The concept of uncertainty has long been used in applied science, especially decision making and a logical decision must be made in the field of uncertainty or in the real-life environment that is formed and combined with vague concepts and data. The chapters of this book are connected to the new concepts and aspects of decision making with uncertainty. Besides, other chapters are involved with the concept of data mining and decision making under uncertain computations.

Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance

Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance

Author: Francia III, Guillermo A.

Publisher: IGI Global

ISBN: 9781799883920

Category: Computers

Page: 309

View: 217

Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information. Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools. It provides a synopsis of current cybersecurity guidance that organizations should consider so that management and their auditors can regularly evaluate their extent of compliance. Covering topics such as cybersecurity laws, deepfakes, and information protection, this premier reference source is an excellent resource for cybersecurity consultants and professionals, IT specialists, business leaders and managers, government officials, faculty and administration of both K-12 and higher education, libraries, students and educators of higher education, researchers, and academicians.

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation

Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation

Author: Sujeet K. Sharma

Publisher: Springer Nature

ISBN: 9783030648619

Category: Computers

Page: 706

View: 849

This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020. The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: diffusion of information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems

ECCWS 2020 20th European Conference on Cyber Warfare and Security

ECCWS 2020 20th European Conference on Cyber Warfare and Security

Author: Dr Thaddeus Eze

Publisher: Academic Conferences and publishing limited

ISBN: 9781912764624

Category: Computers

Page:

View: 314

These proceedings represent the work of contributors to the 19th European Conference on Cyber Warfare and Security (ECCWS 2020), supported by University of Chester, UK on 25-26 June 2020. The Conference Co-chairs are Dr Thaddeus Eze and Dr Lee Speakman, both from University of Chester and the Programme Chair is Dr Cyril Onwubiko from IEEE and Director, Cyber Security Intelligence at Research Series Limited. ECCWS is a well-established event on the academic research calendar and now in its 19th year the key aim remains the opportunity for participants to share ideas and meet. The conference was due to be held at University of Chester, UK, but due to the global Covid-19 pandemic it was moved online to be held as a virtual event. The scope of papers will ensure an interesting conference. The subjects covered illustrate the wide range of topics that fall into this important and ever-growing area of research.