Something of The Book

PDF EPUB Library of e-Books

Security Assessment in Vehicular Networks

Security Assessment in Vehicular Networks

Author: Suguo Du

Publisher: Springer Science & Business Media

ISBN: 9781461493570

Category: Computers

Page: 49

View: 744

Download BOOK »
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

Decision and Game Theory for Security

Decision and Game Theory for Security

Author: Linda Bushnell

Publisher: Springer

ISBN: 9783030015541

Category: Computers

Page: 652

View: 883

Download BOOK »
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security

Author: Alexander Romanovsky

Publisher: Springer Nature

ISBN: 9783030262501

Category: Computers

Page: 412

View: 959

Download BOOK »
This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2019, 38th International Conference on Computer Safety, Reliability and Security, in September 2019 in Turku, Finland. The 32 regular papers included in this volume were carefully reviewed and selected from 43 submissions; the book also contains two invited papers. The workshops included in this volume are: ASSURE 2019: 7th International Workshop on Assurance Cases for Software-Intensive Systems DECSoS 2019: 14th ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2019: 8th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems STRIVE 2019: Second International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms WAISE 2019: Second International Workshop on Artificial Intelligence Safety Engineering

Information Technology and Intelligent Transportation Systems

Information Technology and Intelligent Transportation Systems

Author: Valentina Emilia Balas

Publisher: Springer

ISBN: 9783319387895

Category: Technology & Engineering

Page: 728

View: 553

Download BOOK »
This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi’an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 participants. Each paper was under double peer reviewed by at least 3 reviewers. This proceedings are sponsored by Shaanxi Computer Society and co-sponsored by Chang’an University, Xi’an University of Technology, Northwestern Poly-technical University, CAS, Shaanxi Sirui Industries Co., LTD.

Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security

Author: Amund Skavhaug

Publisher: Springer

ISBN: 9783319454801

Category: Computers

Page: 400

View: 174

Download BOOK »
This book constitutes the refereed proceedings of four workshops co-located with SAFECOMP 2016, the 35th International Conference on Computer Safety, Reliability, and Security, held in Trondheim, Norway, in September 2016. The 30 revised full papers presented together with 4 short and 5 invited papers were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2016 - Assurance Cases for Software-intensive Systems; DECSoS 2016 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; SASSUR 2016 - Next Generation of System Assurance Approaches for Safety-Critical Systems; and TIPS 2016 – Timing Performance in Safety Engineering.

Networked Systems

Networked Systems

Author: Chryssis Georgiou

Publisher: Springer Nature

ISBN: 9783030670870

Category: Computers

Page: 376

View: 825

Download BOOK »
This book constitutes the revised selected papers of the 8th International Conference on Networked Systems, NETYS 2020, held in Marrakech, Morocco, in June 2020.* The 18 revised full papers and 4 short papers presented together with 3 invited papers were carefully reviewed and selected from 46 submissions. The papers cover all aspects related to the design and the development of these systems, including, but not restricted to, concurrent and distributed algorithms, parallel/concurrent/distributed programming, multi-core architectures, formal verification, distributed databases, cloud systems, networks, security, formal verification, etc. *The conference was held virtually due to the COVID-19 pandemic.

Autonomous Vehicles

Autonomous Vehicles

Author: A. Mary Sowjanya

Publisher: John Wiley & Sons

ISBN: 9781119871958

Category: Technology & Engineering

Page: 324

View: 984

Download BOOK »
AUTONOMOUS VEHICLES Addressing the current challenges, approaches and applications relating to autonomous vehicles, this groundbreaking new volume presents the research and techniques in this growing area, using Internet of Things (IoT), Machine Learning (ML), Deep Learning, and Artificial Intelligence (AI). This book provides and addresses the current challenges, approaches, and applications relating to autonomous vehicles, using Internet of Things (IoT), machine learning, deep learning, and Artificial Intelligence (AI) techniques. Several self-driving or autonomous (“driverless”) cars, trucks, and drones incorporate a variety of IoT devices and sensing technologies such as sensors, gyroscopes, cloud computing, and fog layer, allowing the vehicles to sense, process, and maintain massive amounts of data on traffic, routes, suitable times to travel, potholes, sharp turns, and robots for pipe inspection in the construction and mining industries. Few books are available on the practical applications of unmanned aerial vehicles (UAVs) and autonomous vehicles from a multidisciplinary approach. Further, the available books only cover a few applications and designs in a very limited scope. This new, groundbreaking volume covers real-life applications, business modeling, issues, and solutions that the engineer or industry professional faces every day that can be transformed using intelligent systems design of autonomous systems. Whether for the student, veteran engineer, or another industry professional, this book, and its companion volume, are must-haves for any library.

Vehicular Ad-Hoc Networks for Smart Cities

Vehicular Ad-Hoc Networks for Smart Cities

Author: Anis Laouiti

Publisher: Springer

ISBN: 9789811035036

Category: Technology & Engineering

Page: 97

View: 614

Download BOOK »
This book presents selected articles from the Second International Workshop on Vehicular Adhoc Networks for Smart Cities, 2016 (IWVSC’2016). In order to promote further research activities and challenges, it highlights recent developments in vehicular networking technologies and their role in future smart cities.

Innovative Mobile and Internet Services in Ubiquitous Computing

Innovative Mobile and Internet Services in Ubiquitous Computing

Author: Leonard Barolli

Publisher: Springer Nature

ISBN: 9783031088193

Category: Technology & Engineering

Page: 384

View: 314

Download BOOK »
The aim of the book “Innovative Mobile and Internet Services in Ubiquitous Computing” is to provide latest research findings, methods and development techniques, challenges and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges.

Cellular Vehicle-to-Everything (C-V2X)

Cellular Vehicle-to-Everything (C-V2X)

Author: Shanzhi Chen

Publisher: Springer Nature

ISBN: 9789811951305

Category: Computers

Page: 410

View: 431

Download BOOK »
This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications. Because of its low latency and high reliability, C-V2X has become an essential enabling technology for Intelligent Transportation Systems (ITSs) and autonomous driving. This book begins by introducing readers to the research background and status quo of global development. Then, after analyzing the performance requirements of various V2X applications, the system architecture and technical standards are presented. The two evolving stages of C-V2X, i.e., LTE-V2X and NR-V2X, are introduced in detail. In addition, related technologies such as mobile edge computing, network slicing and high-precision positioning, C-V2X security, C-V2X spectrum requirements and planning, and industrial development and applications are introduced. In closing, the book discusses future applications of and technical challenges for C-V2X. This book is the first monograph dedicated to C-V2X, offering experts, researchers and engineers from the areas of IT/CT, intelligent transportation, intelligent and connected vehicles (ICVs) an in-depth understanding of C-V2X technology and standards, while also outlining related interdisciplinary research. The book can also be used as a reference resource for both undergraduate and graduate studies.

Interference in Vehicle-to-vehicle Communication Networks

Interference in Vehicle-to-vehicle Communication Networks

Author: Felix Schmidt-Eisenlohr

Publisher: KIT Scientific Publishing

ISBN: 9783866445710

Category: Electronic computers. Computer science

Page: 180

View: 752

Download BOOK »
In wireless vehicular communication networks the periodic transmission of status updates by all vehicles represents a basic service primitive, in particular for safety related applications. Due to the limited communication resources the question raises how much data each node may provide such that the quality of service required by applications can still be guaranteed under realistic interference conditions. Local broadcasts capacity is introduced and analyzed to tackle this open question.

Computational Intelligence in Recent Communication Networks

Computational Intelligence in Recent Communication Networks

Author: Mariya Ouaissa

Publisher: Springer Nature

ISBN: 9783030771850

Category: Technology & Engineering

Page: 279

View: 995

Download BOOK »
This book focuses on the use of Artificial Intelligence and Machine Learning (AI/ML) based techniques to solve issues related to communication networks, their layers, as well as their applications. The book first offers an introduction to recent trends regarding communication networks. The authors then provide an overview of theoretical concepts of AI/ML, techniques and protocols used in different layers of communication. Furthermore, this book presents solutions that help analyze complex patterns in user data and ultimately improve productivity. Throughout, AI/ML-based solutions are provided, for topics such as signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction, software-defined networking, congestion control, communication network optimization, security, and anomaly detection. The book features chapters from a large spectrum of authors including researchers, students, as well as industrials involved in research and development.