Dieses Open-Access-Buch setzt sich zum Ziel, eingebettet in historische Kontexte paralleler Kalter Kriege im globalen und regionalen Rahmen die historische Genese der amerikanisch-iranischen Sonderbeziehungen nach dem Zweiten Weltkrieg und deren Transformation in den drei anschließenden Jahrzehnten zu analysieren. In der Geschichte der Staatenwelt nach dem Zweiten Weltkrieg gibt es wohl kaum e…
This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, …
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU …
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware …
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Th…
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessmen…
This open access handbook is a major reference work in the field of Military Sciences. Its main purpose is to inform and enlighten those dealing with the military on the role and contributions of science in describing, understanding and explaining military life, knowledge and doings. The handbook provides a comprehensive thematic introduction to various sub-fields of Military Sciences. The …
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information securi…
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts…