This monograph presents original research results on selected problems of dependability in contemporary Complex Information Systems (CIS). The ten chapters are concentrated around the following three aspects: methods for modelling of the system and its components, tasks? or in more generic and more adequate interpretation, functionalities? accomplished by the system and conditions for their cor…
This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…
This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game th…
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling an…
This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: · minimum data rate f…
This book offers students and those new to the topic of analog-to-digital converters (ADCs) a broad introduction, before going into details of the state-of-the-art design techniques for SAR and DS converters, including the latest research topics, which are valuable for IC design engineers as well as users of ADCs in applications. The book then addresses important topics, such as correct connect…
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host?s main memory, storing cryptographic keys, passwo…
This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, e…
This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industria…
This book constitutes thoroughly revised and selected papers from the Second International Congress on Sports Science Research and Technology Support, icSPORTS 2014, held in Rome, Italy, in October 2014. The 8 thoroughly revised and extended papers presented in this volume were carefully reviewed and selected from originally 131 submissions.