This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects …
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, enco…
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; an…
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
This work addresses the challenge of providing effective cutaneous haptic feedback in robotic teleoperation, with the objective of achieving the highest degree of transparency whilst guaranteeing the stability of the considered systems. On the one hand, it evaluates teleoperation systems that provide only cutaneous cues to the operator, thus guaranteeing the highest degree of safety. This cutan…
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D & D) techniques and their orchestration in service of an organization's mission. Concepts for cyber…
This book constitutes the refereed proceedings of the 8th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2015, held in Ljubljana, Slovenia, in September/October 2015. The 14 full papers presented together with 3 invited talks were carefully reviewed and selected from 36 submissions. The focus of the conference was on following topics: sustainab…
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will en…
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies…