Angebote zu "Informatics" (19 Treffer)

Kategorien

Shops

Engineer of the XXI Century
167,67 € *
ggf. zzgl. Versand

This book gathers the proceedings of "Engineer of the XXI Century: The VIII Inter-University Conference of Students, PhD Students and Young Scientists", which was held at the University of Bielsko-Biala (ATH), Poland, on the 8th of December 2017. The event highlighted outstanding research on mechatronics in the broadest sense, while also promoting cooperation among students and young scientists from around the globe. Topic areas covered include: mechanics and machine building, automation and robotics, mechatronics, production engineering and management, and informatics/computer science.

Anbieter: Dodax
Stand: 03.06.2020
Zum Angebot
Cyber-Risk Informatics
130,31 € *
ggf. zzgl. Versand

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems.* Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense* Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds* Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the authorCyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling.Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Anbieter: Dodax
Stand: 03.06.2020
Zum Angebot
Terrorism Informatics
250,00 CHF *
ggf. zzgl. Versand

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and these methods are involved in the collection of huge amounts of information from varied and multiple sources and of many types in numerous languages. Information fusion and information technology analysis techniques—which include data mining, data integration, language translation technologies, and image and video processing—play central roles in the prevention, detection, and remediation of terrorism. While there has been substantial investment on computer technology research applications to terrorism, much of the results and the literature has been a fragmented hodgepodge that is too narrowly focused on unconnected and unlinked discipline domains. As a result, there has been little effort to relate the research across the discipline domains from which terrorism informatics is drawn.   TERROR INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. The book will bring 'knowledge' that can be used by scientists, security professionals, counterterrorism experts, and policy makers.   The book will be organized into three major subject areas: Part I will focus on the methodological issues in terrorism research. The methodological issues that impact trends, achievements, root causes, and failures in terrorism research will be treated within the context of the methods of retrieving and developing, sharing, and implementing terrorism informatics methodologies and resources. Part II will focus on three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. This section will systematically examine the current and ongoing research including recent case studies and application of terrorism informatics techniques. Examples of such techniques are web mining, social network analysis, and multimodal event extraction, analysis to the terrorism phenomenon, etc. Part III will present the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Cyber-Risk Informatics
179,00 CHF *
ggf. zzgl. Versand

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems. * Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense * Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds * Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Practical Aspects of Knowledge Management
124,00 CHF *
ggf. zzgl. Versand

This book contains the papers presented at the 5th International Conference on Pr- tical Aspects of Knowledge Management organized by the Department of Knowledge Management, Institute of Computer Science and Business Informatics, University of Vienna. The event took place on December 02–03, 2004 in Vienna. The PAKM conference series offers a communication forum and meeting ground for practitioners and researchers engaged in developing and deploying advanced bu- ness solutions for the management of knowledge and intellectual capital. Contributions pursuing integrated approaches which consider organizational, technological and c- tural issues of knowledge management have been elected for presentation. PAKM is a forum for people to share their views, to exchange ideas, to develop new insights, and to envision completely new kinds of solutions for knowledge management problems. The accepted papers are of high quality and are not too specialized so that the main issues can be understood by someone outside the respective ?eld. This is crucial for an interdisciplinary exchange of ideas. Like its predecessors, PAKM 2004 featured two invited talks. It is a real joy seeing the visibility of the conferenceincrease and noting that kno- edge management researchers and practitioners from all over the world submitted - pers. This year, 163 papers and case studies were submitted, from which 48 were - cepted.

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Intelligence and Security Informatics
96,90 CHF *
ggf. zzgl. Versand

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Terrorism Informatics
242,00 CHF *
ggf. zzgl. Versand

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and these methods are involved in the collection of huge amounts of information from varied and multiple sources and of many types in numerous languages. Information fusion and information technology analysis techniques—which include data mining, data integration, language translation technologies, and image and video processing—play central roles in the prevention, detection, and remediation of terrorism. While there has been substantial investment on computer technology research applications to terrorism, much of the results and the literature has been a fragmented hodgepodge that is too narrowly focused on unconnected and unlinked discipline domains. As a result, there has been little effort to relate the research across the discipline domains from which terrorism informatics is drawn.   TERROR INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. The book will bring 'knowledge' that can be used by scientists, security professionals, counterterrorism experts, and policy makers.   The book will be organized into three major subject areas: Part I will focus on the methodological issues in terrorism research. The methodological issues that impact trends, achievements, root causes, and failures in terrorism research will be treated within the context of the methods of retrieving and developing, sharing, and implementing terrorism informatics methodologies and resources. Part II will focus on three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. This section will systematically examine the current and ongoing research including recent case studies and application of terrorism informatics techniques. Examples of such techniques are web mining, social network analysis, and multimodal event extraction, analysis to the terrorism phenomenon, etc. Part III will present the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Cyber-Risk Informatics
110,00 CHF *
ggf. zzgl. Versand

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems. * Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense * Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds * Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot
Terrorism Informatics
212,90 CHF *
ggf. zzgl. Versand

Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The variety of methods used in terrorism informatics are derived from Computer Science, Informatics, Statistics, Mathematics, Linguistics, Social Sciences, and Public Policy and they involve the collection of a mass of information from multiple sources and in numerous languages. TERRORISM INFORMATICS: Knowledge Management and Data Mining for Homeland Security will provide an interdisciplinary and comprehensive survey of the state-of-the-art of terrorism informatics domain along three basic dimensions: methodological issues in terrorism research; information infusion techniques to support terrorism prevention, detection, and response; and legal, social, privacy, and data confidentiality challenges and approaches. TOC:Introduction to Terrorism Informatics, Information Fusion, Data Mining and Knowledge Management.- Trends, Achievements and Failures in Terrorism Research.- Methodological Challenges in Terrorism Research.- Case Study of First-Hand Research on Terrorism.- MIPT Sharing Terrorism Information.- Connections in the World of International Terrorism.- The Effect of Databases and Website Inconstancy on the Terrorism Domain.- Root Causes of Terrorism and the Implications for Terrorism Informatics.- Mapping the Contemporary Terrorism Research Domain.- A Study of 'Root Causes of Conflict' Using Latent Semantic Analysis.- Event-Driven Document Selection for Terrorism Information Extraction.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.- Collecting and Analyzing the Presence of Terrorist on the Web: A Case Study of Jihad Websites.- Beyond Keyword Filtering for Message and Conversation Detection.- Apply Authorship Analysis to Arabic Web Content.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Automatic Extraction of Deceptive Behavioral Cues from Video.- Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior.- Toward A Target-Specific Method of Threat Assessment.- A Conceptual Model of Counterterrorist Operations.- Multi-Agent Coordination of Robots for Disaster Response.- Project RESCUE: Challenges in Responding to the Unexpected.- Mining Candidate Viruses as Potential Bio-Terrorism Weapons from Biomedical Literature.- Aptitude for Destruction: Organizational Learning in Terrorist Groups and its Implications for Combating Terrorism.- Data Distortion for Privacy Protection in A Terrorist Analysis System.- Homeland Insecurity: Data Mining, Terrorism Detection, and Confidentiality.- Individual Rights, Information Policy, and Terrorism Informatics.- Information Sharing and Collaboration Policies Within Government Agencies.- Index.

Anbieter: Orell Fuessli CH
Stand: 03.06.2020
Zum Angebot