Rule Based Systems for Big Data


Book Description

The ideas introduced in this book explore the relationships among rule based systems, machine learning and big data. Rule based systems are seen as a special type of expert systems, which can be built by using expert knowledge or learning from real data. The book focuses on the development and evaluation of rule based systems in terms of accuracy, efficiency and interpretability. In particular, a unified framework for building rule based systems, which consists of the operations of rule generation, rule simplification and rule representation, is presented. Each of these operations is detailed using specific methods or techniques. In addition, this book also presents some ensemble learning frameworks for building ensemble rule based systems.




Computational Intelligence and Security


Book Description

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.




Advances in Databases and Information Systems


Book Description

This book constitutes the refereed proceedings of the 8th East European Conference on Advances in Databases and Information Systems, ADBIS 2004, held in Budapest, Hungary, in September 2004. The 27 revised full papers presented together with an invited paper were carefully reviewed and selected from 130 submissions. The papers are organized in topical sections on constraint databases, deductive databases, heterogenous and Web information systems, cross enterprise information systems, knowledge discovery, database modeling, XML and semistructured databases, physical database design and query evaluation, transaction management and workflow systems, query processing and data streams, spatial databases, and agents and mobile systems.




IEEE TENCON 2003


Book Description




Examining the Changing Role of Supervision in Doctoral Research Projects: Emerging Research and Opportunities


Book Description

Academic research projects contribute to many advancements in modern life. Thus, the supervision of such works on the doctoral level is extremely important, and must constantly evolve in order to help disseminate the most accurate information available. Examining the Changing Role of Supervision in Doctoral Research Projects: Emerging Research and Opportunities is a pivotal scholarly resource that examines the current practices that research supervisors adhere to and outlines innovative ways that these techniques can be improved upon. Covering relevant topics such as study environments, technology support, research networks, and research design, this publication is ideal for academics, graduate students, and researchers that are interested in discovering a more streamlined method of supervision for research works.




Information Security Policies and Actions in Modern Integrated Systems


Book Description

This work discusses research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Topics include XML-based management systems, security of multimedia data, and technology and use of smart cards.




Privacy in Statistical Databases


Book Description

This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2016, held in Dubrovnik, Croatia in September 2016 under the sponsorship of the UNESCO chair in Data Privacy. The 19 revised full papers presented were carefully reviewed and selected from 35 submissions. The scope of the conference is on following topics: tabular data protection; microdata and big data masking; protection using privacy models; synthetic data; remote and cloud access; disclosure risk assessment; co-utile anonymization.




Cloud Security


Book Description

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.




Database Security XI


Book Description

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.




Security Enhanced Applications for Information Systems


Book Description

Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.