This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest deve…
This book presents topics on monitoring and evaluation of production processes in the automotive industry. Regulation of production processes is also described in details. The text deals with the implementation and evaluation of these processes during the mass production of components useful in the automotive industry. It evaluates the effects and results achieved after implementation in practi…
Dr. Iosif I. Androulidakis has an active presence in the ICT security field having authored more than 90 publications (including 6 books) and having presented more than 120 talks and lectures in international conferences and seminars in 20 countries. Holding 2 Ph.Ds his research interests focus on security issues in PBXs (private telephony exchanges), where he has 20 years of experience, as…
Model Validation and Uncertainty Quantification, Volume 3. Proceedings of the 33rd IMAC, A Conference and Exposition on Balancing Simulation and Testing, 2015, the third volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dyna…
This Brief concerns the chemical risk in food products from the viewpoint of microbiology. The “Hazard Analysis and Critical Control Point” (HACCP) approach, which is applied for this purpose, is dedicated to the study and the analysis of all possible dangers by food consumptions and the related countermeasures with the aim of protecting the health of consumers. This difficult objective is …
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficul…
The author of this innovative study argues that key politicians and their policy ideas, through "ideational leadership", have played an important role in the passing of structural reforms in the change-resistant German welfare state. This argument is based on in-depth case studies of individual reforms in health care, pensions and unemployment insurance since the early 1990s as well as a concis…
The Arctic-Barents Region is facing numerous pressures from a variety of sources, including the effect of environmental changes and extractive industrial developments. The threats arising out of these pressures result in human security challenges.This book analyses the formation, and promotion, of societal security within the context of the Arctic-Barents Region. It applies the human security f…