Der Vorgang, bei dem digitale Daten im Zuge der Computerisierung entstehen, gespeichert und manuell oder automatisch ausgewertet werden, entzieht sich der unmittelbaren und vollständigen Beobachtbarkeit durch den Menschen. Es mag zwar in gewissem Grad ein Bewusstsein über vermeintliche Konsequenzen oder Resultate geben, wenn digitale Daten entstehen, gespeichert oder ausgewertet werden. …
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware …
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
This chapter offers an introduction to the book and is specifically recommended for all readers intending to do the practical exercises it contains. It also provides readers with all the information they require to make the most of the book’s contents. In this chapter, we explain the aim, structure and intended audience for this book. We also give the readers a few tips and guidelines a…
This open access book constitutes revised selected papers from the International Workshops held at the 4th International Conference on Process Mining, ICPM 2022, which took place in Bozen-Bolzano, Italy, during October 23–28, 2022. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-located workshops…
This open access book constitutes revised selected papers from the International Workshops held at the Third International Conference on Process Mining, ICPM 2021, which took place in Eindhoven, The Netherlands, during October 31–November 4, 2021. The conference focuses on the area of process mining research and practice, including theory, algorithmic challenges, and applications. The co-loca…
The essays in this open access volume identify the key ingredients for success in capitalizing on public investments in scientific projects and the development of large-scale research infrastructures. Investment in science – whether in education and training or through public funding for developing new research tools and technologies – is a crucial priority. Authors from big research lab…
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessmen…
Buku akses terbuka ini mensurvei kemajuan dalam mengatasi tantangan terpilih yang terkait dengan pertumbuhan big data yang dikombinasikan dengan perangkat keras yang semakin rumit. Buku ini muncul dari program penelitian yang dibentuk oleh Yayasan Penelitian Jerman (DFG) sebagai program prioritas SPP 1736 tentang Algoritma untuk Big Data, tempat para peneliti dari ilmu komputer teoritis bekerja…
Buku akses terbuka ini menyajikan hasil ilmiah utama dari proyek H2020 GUARD. Proyek GUARD bertujuan untuk mengisi kesenjangan teknologi saat ini antara paradigma manajemen perangkat lunak dan model keamanan siber, yang terakhir masih kurang orkestrasi dan ketangkasan untuk secara efektif mengatasi dinamika yang pertama. Buku ini memberikan tinjauan komprehensif tentang konsep utama, arsitektur…