Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payme…
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 2…
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
This book reports on the state of the art in the field of multiphysics systems. It consists of accurately reviewed contributions to the MMSSD’2014 conference, which was held from December 17 to 19, 2004 in Hammamet, Tunisia. The different chapters, covering new theories, methods and a number of case studies, provide readers with an up-to-date picture of multiphysics modeling and simulation. T…
This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serv…
This SpringerBrief offers careful assessments of the appropriateness and effectiveness of currently available methodologies for fire flow. It explains the water supply requirements for firefighting including rate of flow, the residual pressure required at that flow, and the duration that is necessary to control a major fire in a specific structure. First reviewing existing fire flow calculation…
This book details how safety (i.e. the absence of unacceptable risks) is ensured in areas where potentially explosive atmospheres (ATEX) can arise. The book also offers readers essential information on how to comply with the newest (April 2016) EU legislation when the presence of ATEX cannot be avoided. By presenting general guidance on issues arising out of the EU ATEX legislation – espec…
The current volume provides examples of how environmental hazards such as landslides, earthquakes, mountain processes, cold climate processes and tidal flows and currents can affect the energy supply infrastructure. In times of uncertainty, the security of the European cross-border energy supply infrastructure, such as pipelines, has great importance. Whilst the potential effects of political d…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…