Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experience…
This book constitutes the refereed proceedings of the 16th International Conference on Engineering Applications of Neural Networks, EANN 2015, held in Rhodes, Greece, in September 2015. The 36 revised full papers presented together with the abstracts of three invited talks and two tutorials were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections…
Lars Dannecker developed a novel online forecasting process that significantly improves how forecasts are calculated. It increases forecasting efficiency and accuracy, as well as allowing the process to adapt to different situations and applications. Improving the forecasting efficiency is a key pre-requisite for ensuring stable electricity grids in the face of an increasing amount of renewable…
This volume constitutes the refereed proceedings of the 10th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, EMMCVPR 2015, held in Hong Kong, China, in January 2015. The 36 revised full papers were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on discrete and continuous optimization; image re…
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Energy Efficient Data Centers, E2DC 2014, held in Cambridge, UK, in June 2014. The 10 revised full papers presented were carefully selected from numerous submissions. They are organized in three topical sections named: energy optimization algorithms and models, the future role of dat…
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; appl…