This book has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 856632. Specifically, the chapters of the book present work and results achieved in the scope of the H2020 INFINITECH project. The editors acknowledge the contributions of all coauthors, as well as support from all INFINITECH project partners.
The role data plays in enterprises is changing as the digital transformation in many sectors gains speed. New business opportunities through data-driven innovation emerge from data sharing in ecosystems. In ecosystems, the interest of the individual must be brought into alignment with the interest of the ecosystem. Trust between participants, data interoperability, and data sovereignty are …
Der Vorgang, bei dem digitale Daten im Zuge der Computerisierung entstehen, gespeichert und manuell oder automatisch ausgewertet werden, entzieht sich der unmittelbaren und vollständigen Beobachtbarkeit durch den Menschen. Es mag zwar in gewissem Grad ein Bewusstsein über vermeintliche Konsequenzen oder Resultate geben, wenn digitale Daten entstehen, gespeichert oder ausgewertet werden. …
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware …
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
This chapter offers an introduction to the book and is specifically recommended for all readers intending to do the practical exercises it contains. It also provides readers with all the information they require to make the most of the book’s contents. In this chapter, we explain the aim, structure and intended audience for this book. We also give the readers a few tips and guidelines a…
This open access book constitutes revised selected papers from the International Workshops held at the 4th International Conference on Process Mining, ICPM 2022, which took place in Bozen-Bolzano, Italy, during October 23–28, 2022. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-located workshops…
This open access book constitutes revised selected papers from the International Workshops held at the Third International Conference on Process Mining, ICPM 2021, which took place in Eindhoven, The Netherlands, during October 31–November 4, 2021. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-loca…
The essays in this open access volume identify the key ingredients for success in capitalizing on public investments in scientific projects and the development of large-scale research infrastructures. Investment in science – whether in education and training or through public funding for developing new research tools and technologies – is a crucial priority. Authors from big research lab…
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessmen…