This book will help readers gain a solid understanding of non-functional requirements inherent in systems design endeavors. It contains essential information for those who design, use and maintain complex engineered systems, including experienced designers, teachers of design, system stakeholders and practicing engineers. Coverage approaches non-functional requirements in a novel way by pres…
This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it …
Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
The book addresses all major aspects to be considered for the design and operation of aircrafts within the entire transportation chain. It provides the basic information about the legal environment, which defines the basic requirements for aircraft design and aircraft operation. The interactions between airport, air traffic management and the airlines are described. The market forecast meth…
This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book examines real-time target tracking and identification algorithms with a focus on tracking an agile target. The authors look at several problems in which the tradeoff of accuracy and confidence must be made. These issues are explored within the context of specific tracking scenarios chosen to illustrate the tradeoffs in a simple and direct manner. The text covers the Gaussian wavelet e…
Direct contributing factors of the catastrophic nuclear incident at Fukushima Daiichi NPP initiated by an unprecedented massive earthquake/ tsunami – inadequacies in tsunami measures, severe accident management, emergency response, accident recovery and mitigations – and the underlying factors - organizational issues, etc., have been clarified and recommendations in the following areas hav…