Multimedia Communications, Services and Security: 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, Proceedings (Communications in Computer and Information Science)

دانلود کتاب Multimedia Communications, Services and Security: 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, Proceedings (Communications in Computer and Information Science)

33000 تومان موجود

کتاب ارتباطات ، خدمات و امنیت چندرسانه ای: یازدهمین کنفرانس بین المللی ، MCSS 2022 ، کراکو ، لهستان ، 3-4 نوامبر ، 2022 ، مجموعه مقالات (ارتباطات در علوم رایانه و اطلاعات) نسخه زبان اصلی

دانلود کتاب ارتباطات ، خدمات و امنیت چندرسانه ای: یازدهمین کنفرانس بین المللی ، MCSS 2022 ، کراکو ، لهستان ، 3-4 نوامبر ، 2022 ، مجموعه مقالات (ارتباطات در علوم رایانه و اطلاعات) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 2


توضیحاتی در مورد کتاب Multimedia Communications, Services and Security: 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, Proceedings (Communications in Computer and Information Science)

نام کتاب : Multimedia Communications, Services and Security: 11th International Conference, MCSS 2022, Kraków, Poland, November 3–4, 2022, Proceedings (Communications in Computer and Information Science)
عنوان ترجمه شده به فارسی : ارتباطات ، خدمات و امنیت چندرسانه ای: یازدهمین کنفرانس بین المللی ، MCSS 2022 ، کراکو ، لهستان ، 3-4 نوامبر ، 2022 ، مجموعه مقالات (ارتباطات در علوم رایانه و اطلاعات)
سری :
نویسندگان : , ,
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 179
ISBN (شابک) : 3031202147 , 9783031202148
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 15 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface
Organization
Contents
Secrecy Performance of Scenario with Multiple Antennas Cooperative Satellite Networks
1 Introduction
2 System Model
3 Performance Analysis
3.1 COP of D2
3.2 COP of D1
3.3 SOP of D2
3.4 SOP of D1
4 Numerical Result And Discussions
5 Conclusion
References
Attack Detection in SS7
1 Introduction
2 Signaling System No. 7 (SS7)
2.1 SS7 Historical Facts
2.2 Network Components
3 SS7/MAP Threats
3.1 Location Tracking
3.2 SMS Interception
3.3 Call Eavesdropping
3.4 Denial of Service
3.5 Fraud
4 Common Defences
4.1 Encryption
4.2 SMS Home Routing
4.3 SS7 Firewall
5 Planned Implementation
5.1 Overall Picture
5.2 Needed Data
5.3 Processing
6 Conclusions
References
Sector-Specific Training - A Federated Maritime Scenario
1 Introduction
2 The Case for a Federation of Ranges
3 Cyber Security in the Maritime Sector
4 Federated Maritime Scenario Training
4.1 Context and Objective of the Training
4.2 The Maritime Scenario
4.3 Technical Aspects of the Federation
4.4 The Attacker Perspective
4.5 Training: The Defense Perspective
4.6 Reception from the Audience
5 Conclusion and Future Work
References
E-Skills in Cybersecurity
1 Introduction
2 Literature
2.1 Organizational Learning
2.2 Skills Acquisition
2.3 Cybersecurity Skills
3 Method
4 Results
4.1 Job Ads by Sector and Level of Expertise
4.2 Technical E-Skills
4.3 Situation Awareness E-Skill
4.4 Problem-Solving E-Skills
4.5 Business Administration E-Skills
5 Conclusions
References
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities
1 Introduction
2 Risk Assessment and Management
3 Sector-Specific Cybersecurity Frameworks
3.1 Healthcare
3.2 Energy
3.3 Maritime
3.4 Defence
4 Cybersecurity Challenges and Opportunities
4.1 Transversal Challenges and Opportunities
4.2 Inter-sectoral Challenges and Opportunities
4.3 Technological Challenges and Opportunities
5 Multi-sector Assessment Framework
5.1 Architecture
5.2 Logical Model
6 Summary
References
AI Cybersecurity Assurance for Autonomous Transport Systems: Scenario, Model, and IMECA-Based Analysis
1 Introduction
2 State of the Art
3 An Approach to the Analysis of AI Application for ATS Cybersecurity Assurance
4 Scenarios and Stories of AI Based Cybersecurity Assurance
4.1 Scenarios
4.2 Epics and User Stories
5 AI Quality Model
6 IMECA for Cyber Security Assessment and Assurance
6.1 IMECA Technique
6.2 Case Study for User Story
7 Conclusion
References
Integration of Image Analysis Component with Industrial Workflow Management System
1 Introduction
2 Related Works
3 INRED System
4 Maintenance Process Supported by Workflow Procedure
5 Supporting of Valve Assembly with a Vision System
5.1 Calibration Module
5.2 Wrench Detection Module
6 Mobile Devices Communication Subsystem (MDCS)
7 Conclusions
References
Impact of Nonbinary Input Vectors on Security of Tree Parity Machine
1 Introduction
2 Tree Parity Machine
2.1 Related Works
2.2 Architecture of Tree Parity Machine
2.3 Tree Parity Machine Key Agreement Protocol
2.4 Security of Tree Parity Machine
3 Results
3.1 Key Quality Measurement Methodology
3.2 Simulation Environment
3.3 Simulation Results
4 Conclusion
References
Approach to Sector-Specific Cybersecurity Schemes: Key Elements and Security Problem Definition
1 Introduction
2 Sector Specific Schemes
2.1 Rules and Procedures
2.2 Technical Requirements
2.3 Sectoral Standards
3 Approach to Sector-Specific Scheme Definition
4 Security Problem Definition
4.1 Assumptions, Organisational Security Policy and Threats
4.2 Sectoral Risk Assessment
5 Security Objectives and Risk-Based Security Controls
6 Conformity Assessment with Cyber Ranges
7 Conclusion and Next Steps
References
Technology and Police: A Way to Create Predicting Policing
1 Introduction
2 Technical State of the Art
3 Technological Applications in the Police Role
3.1 Crime Mapping
3.2 Data Mining and Big Data
3.3 Social Media
3.4 Video Surveillance. Number Plate Readers and Body and Car Cameras
3.5 Drones and Police Intelligence (UAVs)
4 Predictive Policing
5 Conclusions
References
BCI: Technologies and Applications Review and Toolkit Proposal
1 Introduction
2 Literature Review
2.1 Brain-Computer Interface (BCI)
2.2 Implementation of BCI Systems
2.3 BNCI Horizon 2020
3 Research on Current BCI Technologies and Applications
3.1 Results
4 Kit for Experimentation
4.1 Software Dedicated to the Study of the Brain
4.2 Datasets Available Online
4.3 Equipment for Experimentation
4.4 Demonstration Applications
5 Conclusions
References
Clustering-Based Filtering of Big Data to Improve Forecasting Effectiveness and Efficiency
1 Introduction
2 Continental Factory of the Future
3 Proposed Methodology
4 Experimental Findings
5 Conclusions
References
Method for Assessing Objective Video Quality for Automatic License Plate Recognition Tasks
1 Introduction
2 Materials and Methods
2.1 Acquisition of the Existing Source Reference Circuits (SRC)
2.2 Preparation of Hypothetical Reference Circuits (HRC)
2.3 Recognition Experiment
2.4 Quality Experiment
3 Results
4 Conclusions
References
Author Index




پست ها تصادفی