Model Validation and Uncertainty Quantification, Volume 3. Proceedings of the 33rd IMAC, A Conference and Exposition on Balancing Simulation and Testing, 2015, the third volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dyna…
This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficul…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
The Arctic-Barents Region is facing numerous pressures from a variety of sources, including the effect of environmental changes and extractive industrial developments. The threats arising out of these pressures result in human security challenges.This book analyses the formation, and promotion, of societal security within the context of the Arctic-Barents Region. It applies the human security f…
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…
The aim of this open access book is to take stock of, critically engage, and celebrate feminist IR scholarship produced in Europe. Organized thematically, the volume highlights a wealth of excellent scholarship, while also focusing on the politics of location and the international political economy of feminist knowledge production. Who are some of the central feminist scholars located in Europe…
Challenging the Westphalian view of international relations, which focuses on the sovereignty of states and the inevitable potential for conflict, the authors from the Borderlands Study Group reconceive borders as capillaries enabling the flow of material, cultural, and social benefits through local communities, nation-states, and entire regions. By emphasizing local agency and regional interde…