Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,489
result(s) for
"Computer security Congresses."
Sort by:
Engineering trustworthy software systems : 4th International School, SETSS 2018, Chongqing, China, April 7-12, 2018, Tutorial Lectures
This volume contains lectures on leading-edge research in methods and tools for use in computer system engineering; at the 4th International School on Engineering Trustworthy Software Systems, SETSS 2018, held in April 2018 at Southwest University in Chongqing, China. The five chapters in this volume provide an overview of research in the frontier of theories, methods, and tools for software modelling, design, and verification. The topics covered in these chapter include Software Verification with Whiley, Learning Büchi Automata and Its Applications, Security in IoT Applications, Programming in Z3, and The Impact of Alan Turing: Formal Methods and Beyond. The volume provides a useful resource for postgraduate students, resarchers, academics, and engineers in industry, who are interested in theory, methods, and tools for the development of trustworthy software.
Proceedings of International Conference on Smart Computing and Cyber Security : strategic foresight, security challenges and innovation (SMARTCYBER 2020)
by
International Conference on Smart Computing and Cyber Security (2020 : Department of Smart Computing, Kyungdong University, Global Campus, South Korea)
,
Pattnaik, Prasant Kumar, 1969- editor
,
Sain, Mangal, editor
in
Computer security Congresses.
,
Sécurité informatique Congrès.
,
Computer security.
Proceedings of International Conference on Smart Computing and Cyber Security : strategic foresight, security challenges and innovation (SMARTCYBER 2021)
by
International Conference on Smart Computing and Cyber Security (2nd : 2021 : Department of Smart Computing, Kyungdong University, Global Campus, South Korea)
,
Pattnaik, Prasant Kumar, 1969- editor
,
Sain, Mangal, editor
in
Computer security Congresses.
,
Sécurité informatique Congrès.
,
Computer security
Security and embedded systems
by
NATO Advanced Research Workshop on Security and Embedded Systems
,
Giladi, Ran
,
Serpanos, Dimitrios Nikolaou
in
Computer security
,
Computer security -- Congresses
,
Congresses
2006
Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id's to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded systems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field. This publication brings together one of the first international efforts to emphasize the importance of this emerging technical field and provides presentations of leading researchers in the field. Its objectives are to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, three main areas are discussed: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services.
Formal Logical Methods for System Security and Correctness
2008
The objective of this publication is to present the state-of-the-art in the field of proof technology in connection with secure and correct software. The contributors have shown that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees. By providing the necessary theoretical background and presenting corresponding application oriented concepts, the objective is an in-depth presentation of such methods covering both theoretical foundations and industrial practice.