Information Security and Assurance


Book Description

This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.




E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life


Book Description

This book constitutes the refereed proceedings of the Workshop on E-Business (WeB 2015), held in Fort Worth, Texas, USA, on December 12, 2015. The theme of WeB 2015 was “Leveraging Service Computing and Big Data Analytics for E-Commerce”, and thus the workshop provided an interactive forum by bringing together researchers and practitioners from all over the world to explore the latest challenges of next-generation e-Business systems and the potential of service computing and big data analytics. The 11 full and 17 short papers, which were selected from 45 submissions to the workshop, addressed a broad coverage of technical, managerial, economic, and strategic issues related to e-business, with emphasis on service computing and big data analytics. They employed various IS research methods such as case study, survey, analytical modeling, experiments, computational models, and design science.







Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis (WDFIA 2012)


Book Description

The field of digital forensics is rapidly evolving and continues to gain significance in both the law enforcement and the scientific community. Being intrinsically interdisciplinary, it draws upon a wide range of subject areas such as information & communication technologies, law, social sciences and business administration. With this in mind, the workshop on Digital Forensics and Incident Analysis (WDFIA) specifically addresses this multi-facetted aspect, with papers invited from the full spectrum of issues relating to digital forensics and incident analysis. This book represents the proceedings from the 2012 event, which was held in Crete, Greece. A total of 13 papers are included, spanning a range of topics including systems and network investigation, services and applications and supporting the forensic process. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.




WDFIA 2008


Book Description




Proceedings of the Tenth International Network Conference (INC 2014)


Book Description

This book contains the proceedings of the Tenth International Network Conference (INC 2014), which was held in Plymouth, UK, in July 2014. A total of 13 papers were accepted for inclusion in the conference (with a further three papers included in these proceedings from the Ninth International Workshop on Digital Forensics and Incident Analysis). The main topics of the book include: Network Technologies; Mobile and Wireless Networking; Security and Privacy; Applications and Impacts. The papers address state-of-the-art research and applications of network technology, arising from both the academic and industrial domains. These proceedings should consequently be of interest to network practitioners, researchers, academics, and technical managers involved in the design, development and use of network systems.




Information Fusion for Cyber-Security Analytics


Book Description

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.




Information and Communications Security


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.




Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities


Book Description

This book provides stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation results (using several analytics tools), and an application-oriented approach that can be demonstrated with respect to data analytics using artificial intelligence to make systems stronger (i.e., impossible to breach). We can see many serious cyber breaches on Government databases or public profiles at online social networking in the recent decade. Today artificial intelligence or machine learning is redefining every aspect of cyber security. From improving organizations’ ability to anticipate and thwart breaches, protecting the proliferating number of threat surfaces with Zero Trust Security frameworks to making passwords obsolete, AI and machine learning are essential to securing the perimeters of any business. The book is useful for researchers, academics, industry players, data engineers, data scientists, governmental organizations, and non-governmental organizations.