Computer Science

Roadmap for DevOps in Cyber-physical systems

Chronologie aller Bände (1 - 15)

Die Reihenfolge beginnt mit dem eBook "The First Line of Code". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Sukanta Kumar Sabut beginnen. Der zweite Teil der Reihe "Ubiquitous Security" ist am 25.02.2022 erschienen. Mit insgesamt 15 Bänden wurde die Reihe über einen Zeitraum von ungefähr 5 Jahren fortgesetzt. Der neueste Band trägt den Titel "Synergies in Data Analytics and Cyber Security".

  • Anzahl der Bewertungen für die gesamte Reihe: 0
  • Ø Bewertung der Reihe: 0
  • Start der Reihe: 02.04.2021
  • Neueste Folge: 20.12.2025

Diese Reihenfolge enthält 14 unterschiedliche Autoren.

Cover: The First Line of Code
  • Autor: Guo, Lin
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 27.05.2022
  • Genre: Sachbuch

The First Line of Code

The First Line of Code is a must-have for developers who want to learn Android and Kotlin, and the best-seller in China. Knowledge between Android and Kotlin is interspersed in a way that readers are easy to understand and get start:

·         Android part covers all the important aspects of the Android platform, such as activity, service, content provider, broadcast receiver, fragment, basic UI, data storage, network, Jetpack and other application-level knowledge.

·         Kotlin part covers various aspects of Kotlin, such as standard grammar, common skills, higher-order functions, generics, coroutines, DSL and other language-level knowledge.

In addition, The First Line of Code is a very practicing book, illustrating concepts with a complete weather forecast program. You can use and practice all the knowledge comprehensively after learning and see the actual result for what you have learned through the book.

All contents of the book are quite easy to understand. It might be a good choice for both beginners and experienced developers. Also suitable for college students, college teachers, etc.

Cover: Content Distribution for Mobile Internet: A Cloud-based Approach
  • Autor: Li, Zhenhua
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 11.02.2023
  • Genre: Sachbuch

Content Distribution for Mobile Internet: A Cloud-based Approach

Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon’s launch of EC2 in 2006 and Apple’s release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers (“heavy-cloud”) all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices (“light-end”) have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances.

Motivated by the trend of “heavy-cloud vs. light-end,” this book is dedicated to uncovering the root causes of today’s mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.


Cover: Android Malware Detection and Adversarial Methods
  • Autor: Niu, Weina
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 23.05.2024
  • Genre: Sonstiges

Android Malware Detection and Adversarial Methods

The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware.

This book is a comprehensive academic monograph crafted against this backdrop. The publication meticulously explores the background, methods, adversarial approaches, and future trends related to Android malware. It is organized into four parts: the overview of Android malware detection, the general Android malware detection method, the adversarial method for Android malware detection, and the future trends of Android malware detection. Within these sections, the book elucidates associated issues, principles, and highlights notable research.

By engaging with this book, readers will gain not only a global perspective on Android malware detection and adversarial methods but also a detailed understanding of the taxonomy and general methods outlined in each part. The publication illustrates both the overarching model and representative academic work, facilitating a profound comprehension of Android malware detection.


Cover: Roadmap for DevOps in Cyber-physical systems
  • Autor: Panichella, Sebastiano
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 13.12.2025
  • Genre: Sonstiges

Roadmap for DevOps in Cyber-physical systems

This book presents challenges, bad/best practices, experiences, tools, gaps, and future directions in the field. This will guide future generations of experts moving forward on DevOps and testing automation for complex CPSs.

Cover: Information Security, Privacy and Digital Forensics
  • Autor: Gohil, Bhavesh N.
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 18.12.2025
  • Genre: Sonstiges

Information Security, Privacy and Digital Forensics

This volume contains the selected proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2023). The content highlights novel contributions and recent developments in areas such as cyber-attacks and defenses, computer forensics, cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, and hardware security, among others. This volume will serve as a valuable resource for researchers in both industry and academia who are working in the fields of security, privacy, and digital forensics from both technological and social perspectives.

 

Cover: Synergies in Data Analytics and Cyber Security
  • Autor: Puthal, Deepak
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: Digital
  • Veröffentlicht: 20.12.2025
  • Genre: Sonstiges

Synergies in Data Analytics and Cyber Security

This book presents the select proceedings of the 7th International Conference on Data Analytics and Cyber Security (DACS 2024). It covers distinct features of various data analytics, cyber security, and synergies in data analytics and cyber security to resolve physical world problems. The book will be useful for researchers and professionals interested in the broad field of cyber security.

Cover: Proceedings of International Conference on Communication, Circuits, and Systems
  • Band: 728
  • Autor: Sabut, Sukanta Kumar
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 02.04.2021
  • Genre: Sonstiges

Proceedings of International Conference on Communication, Circuits, and Systems

The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 – 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
Cover: Mobile Internet Security
  • Band: 1544
  • Autor: You, Ilsun
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 22.01.2022
  • Genre: Krimi

Mobile Internet Security

This book constitutes the refereed proceedings of the 5th International Symposium on Mobile Internet Security, MobiSec 2021, held in Jeju Island, Republic of Korea, in October 2021.

The 28 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in the topical sections: IoT and cyber security; blockchain security; digital forensic and malware analysis; 5G virtual Infrastructure, cryptography and network security.

Cover: Ubiquitous Security
  • Band: 1557
  • Autor: Wang, Guojun
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 25.02.2022
  • Genre: Krimi

Ubiquitous Security

This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
Cover: Mobile Internet Security
  • Band: 1644
  • Autor: You, Ilsun
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 19.07.2023
  • Genre: Krimi

Mobile Internet Security

This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15–17, 2022.
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
Cover: Applications and Techniques in Information Security
  • Band: 1804
  • Autor: Prabhu, Srikanth
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 19.06.2023
  • Genre: Krimi

Applications and Techniques in Information Security

This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022.
The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
Cover: Emerging Information Security and Applications
  • Band: 2004
  • Autor: Shao, Jun
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 03.01.2024
  • Genre: Krimi

Emerging Information Security and Applications

This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023. 
The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited  to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
Cover: Information Security Practice and Experience
  • Band: 14341
  • Autor: Meng, Weizhi
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 22.11.2023
  • Genre: Krimi

Information Security Practice and Experience

This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.
The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Cover: Pattern Recognition and Computer Vision
  • Band: 14426
  • Autor: Liu, Qingshan
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 23.12.2023
  • Genre: Sonstiges

Pattern Recognition and Computer Vision

The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.


The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis. 


Cover: Advances in Cryptology – ASIACRYPT 2023
  • Band: 14440
  • Autor: Guo, Jian
  • Anzahl Bewertungen: 0
  • Ø Bewertung:
  • Medium: E-Book
  • Veröffentlicht: 17.12.2023
  • Genre: Sonstiges

Advances in Cryptology – ASIACRYPT 2023

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.

The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:  

Part I: Secure Multi-party computation; threshold cryptography; .  

Part II: proof systems - succinctness and foundations; anonymity; 

Part III: quantum cryptanalysis; symmetric-key cryptanalysis; 

Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; 

Part V: functional encryption, commitments and proofs; secure messaging and broadcast; 

Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; 

Part VII: post-quantum cryptography; 

Part VIII: quantum cryptography; key exchange; symmetric-key design.

Diesen Artikel teilen