This book reports on the state of the art in the field of multiphysics systems. It consists of accurately reviewed contributions to the MMSSD’2014 conference, which was held from December 17 to 19, 2004 in Hammamet, Tunisia. The different chapters, covering new theories, methods and a number of case studies, provide readers with an up-to-date picture of multiphysics modeling and simulation. T…
This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefit…
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Mobile, Secure, and Programmable Networking, MSPN 2015, held in Paris, France, in June 2015. The 14 papers presented in this volume were carefully reviewed and selected from 36 submissions. They discuss new trends in networking infrastructures, security, services and applications …
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of …
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest deve…
This book presents topics on monitoring and evaluation of production processes in the automotive industry. Regulation of production processes is also described in details. The text deals with the implementation and evaluation of these processes during the mass production of components useful in the automotive industry. It evaluates the effects and results achieved after implementation in practi…
Dr. Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 90 publications (including 6 books) and having presented more than 120 talks and lectures in international conferences and seminars in 20 countries. Holding 2 Ph.Ds his research interests focus on security issues in PBXs (private telephony exchanges), where he has 20 years of experience, as…
Model Validation and Uncertainty Quantification, Volume 3. Proceedings of the 33rd IMAC, A Conference and Exposition on Balancing Simulation and Testing, 2015, the third volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dyna…
This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…