Dr. Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 90 publications (including 6 books) and having presented more than 120 talks and lectures in international conferences and seminars in 20 countries. Holding 2 Ph.Ds his research interests focus on security issues in PBXs (private telephony exchanges), where he has 20 years of experience, as…
Model Validation and Uncertainty Quantification, Volume 3. Proceedings of the 33rd IMAC, A Conference and Exposition on Balancing Simulation and Testing, 2015, the third volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dyna…
This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficul…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
The Arctic-Barents Region is facing numerous pressures from a variety of sources, including the effect of environmental changes and extractive industrial developments. The threats arising out of these pressures result in human security challenges.This book analyses the formation, and promotion, of societal security within the context of the Arctic-Barents Region. It applies the human security f…
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They…
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…