Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
62 result(s) for "Computer security-Congresses"
Sort by:
Engineering trustworthy software systems : 4th International School, SETSS 2018, Chongqing, China, April 7-12, 2018, Tutorial Lectures
This volume contains lectures on leading-edge research in methods and tools for use in computer system engineering; at the 4th International School on Engineering Trustworthy Software Systems, SETSS 2018, held in April 2018 at Southwest University in Chongqing, China. The five chapters in this volume provide an overview of research in the frontier of theories, methods, and tools for software modelling, design, and verification. The topics covered in these chapter include Software Verification with Whiley, Learning Büchi Automata and Its Applications, Security in IoT Applications, Programming in Z3, and The Impact of Alan Turing: Formal Methods and Beyond. The volume provides a useful resource for postgraduate students, resarchers, academics, and engineers in industry, who are interested in theory, methods, and tools for the development of trustworthy software.
Security and embedded systems
Technological advances have led to wide deployment and use of embedded systems in an increasing range of applications, from mobile phones to car, plane and spacecraft and from digital id's to military systems in the field. Many of these applications place significant security requirements and have led to significant research activity in the area of security and embedded systems, due to the limited resources of conventional embedded systems. This emerging research area is of great importance to a large number of public and private organizations, due to their desire to deploy secure embedded systems in the field. This publication brings together one of the first international efforts to emphasize the importance of this emerging technical field and provides presentations of leading researchers in the field. Its objectives are to present the technologies and open problems of the emerging area of security and embedded systems, to present the latest research results in all aspects of security in embedded systems, and, finally, to provide a roadmap of the technology for the future. Considering the main directions of research in the field, three main areas are discussed: (i) foundations of security and embedded systems, (ii) secure embedded computing systems and (iii) telecommunications and network services.
Secure Telematic Applications for National Scale Projects
The NATO Advances Research Workshop (ARW) 'Secure Telematic Applications for National Scale Projects' is organized in the frame of the National Week of Information Technologies and Sixth International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in the Republic of Belarus. Secure Telematic Applications in National and International Projects'. The participants of the event came to Minsk from all regions of Europe, as well as from Asia and Africa. Besides the general ARW topic, the participants also discussed the progress in the activity of the High Technologies Park, the creation of the corporate network of libraries of Belarus on the basis of the National Library of Belarus and the newest technologies of e-government. The presentations are also oriented on creation of the National Scientific and Research Computer Network of the Republic of Belarus on the basis of Academic Network BASNET. It is expected that the scientific and practical achievements of the forum will considerably influence both the development of the information technologies and their utilization for advantage of the national economy of Belarus and all participating countries.