Editors Butenko, Pasiliao, and Shylo present readers with a collection of papers from the NATO Advanced Research Workshop Examining Robustness and Vulnerability of Critical Infrastructure Networks held in June of 2013 in Kiev, Ukraine. The selections...Loe edasi...
Until quite recently, the correctness and security of software systems was a largely theoretical problem relevant only for a small group of computer specialists. Today it is a fundamental problem for society at large, with security breaches in bankin...Loe edasi...
The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against ma...Loe edasi...
Because almost all technical systems are more or less interfaced with software these days, attacks against computer systems can cause considerable economic and physical damage. For this reason, understanding the dependability of such systems, as well...Loe edasi...
The Institute comprised three integrated modules, on foundations of safety and security, applications of safety analysis, and security analysis. The 12 topics they encompassed include mechanized game-based proofs of security protocols, interactive pr...Loe edasi...
From a September 2010 NATO institute in Tangier, Morocco, 14 papers explore the potential of software agents in dealing with security concerns. Among their topics are modeling multi-agent systems with the Agent Modeling Language, security and anonymi...Loe edasi...
Nine established and new researchers and practitioners share their experience with specifying and verifying software systems, along with the corresponding tools and methods. They cover model-based testing, schemes and patterns of assumption/promise b...Loe edasi...
The 17 papers are based on presentations to a May-June 2010 institute in Opatija, Croatia, and revolve around combinatorial mathematics used in applications related to information security, cryptography, and coding theory. Among the topics are genera...Loe edasi...
This collection of eighteen articles on data mining and anti-terrorist intelligence gathering is drawn from papers originally presented at the NATO Advanced research Workshop on Web Intelligence and Security held in November, 2009 in Ein-Bokek, Israe...Loe edasi...
The multidisciplinary Advanced Research Workshp (ARW) entitled Human Systems Integration to Enhance Maritime Domain Awareness for Port/Harbour Security brought together experts in the domains of Harbour/Port Security and Human Factors, as well as K...Loe edasi...
The May 2008 conference New Challenges in Digital Communications, held in Vlora, Albania, explored how algebra, algebraic geometry, number theory, graph theory, and other areas of mathematics are related to coding theory and cryptology. A selection o...Loe edasi...
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008. This title includes the papers based on the lectures of the i...Loe edasi...
Based on the specific needs in applications of software technology, models and formal methods must serve the needs and the quality of advanced software engineering methods. This book provides a presentation of topics on how to meet such challenges c...Loe edasi...
Contains information about many core facets of modern computational-linguistic work. This book is suitable for people interested in learning about strategies that are best suited for developing computational-linguistic capabilities for lesser-studie...Loe edasi...
The NATO Advances Research Workshop Secure Telematic Applications for National Scale Projects is organized in the frame of National Week of Information Technologies and 6th International Congress Scientific and Methodological Facilitation of the...Loe edasi...
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. This book is suitable for those interested in understanding the techniques for handling very large da...Loe edasi...
This volume is a collection of papers presented during the NATO-Russia Advanced Study Institute Boolean Functions in Cryptology and Information Security proceedings held in Zvenigorod, Russia, in September 2007. The collection includes the texts of l...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Critical infrastructure protection, intrusion prevention, and threat assessment are discussed in the 27 papers, which began as lectures by scientists to graduate students. The topics include security when routers are taken over by the adversary, mobi...Loe edasi...
These proceedings of the June-July 2007 conference include papers on recent developments in algebraic geometry over finite fields with particular attention to applications of geometric techniques to the study of rational points on varieties over fini...Loe edasi...
The editors (of Rutgers U. in the United States and Ben-Gurion U. of the Negev in Israel) present 19 papers from a June 2007 conference that brought computer scientists together with scholars of intelligence and terrorism to discuss issues connected...Loe edasi...