This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications
Personalized and adaptive systems employ user models to adapt content, services, interaction or navigation to individual users´ needs. User models can be inferred from implicitly observed information, such as the user´s interaction history or current location, or from explicitly entered information, such as user profile data or ratings. Applications of personalization include item recommendation, location-based services, learning assistance and the tailored selection of interaction modalities. With the transition from desktop computers to mobile devices and ubiquitous environments, the need for adapting to changing contexts is even more important. However, this also poses new challenges concerning privacy issues, user control, transparency, and explainability. In addition, user experience and other human factors are becoming increasingly important. This book describes foundations of user modeling, discusses user interaction as a basis for adaptivity, and showcases several personalization approaches in a variety of domains, including music recommendation, tourism, and accessible user interfaces.
Data Science steht derzeit wie kein anderer Begriff für die Auswertung großer Datenmengen mit analytischen Konzepten des Machine Learning oder der künstlichen Intelligenz. Nach der bewussten Wahrnehmung der Big Data und dabei insbesondere der Verfügbarmachung in Unternehmen sind Technologien und Methoden zur Auswertung dort gefordert, wo klassische Business Intelligence an ihre Grenzen stößt. Dieses Buch bietet eine umfassende Einführung in Data Science und deren praktische Relevanz für Unternehmen. Dabei wird auch die Integration von Data Science in ein bereits bestehendes Business-Intelligence-Ökosystem thematisiert. In verschiedenen Beiträgen werden sowohl Aufgabenfelder und Methoden als auch Rollen- und Organisationsmodelle erläutert, die im Zusammenspiel mit Konzepten und Architekturen auf Data Science wirken. Neben den Grundlagen werden unter anderem folgende Themen behandelt: - Data Science und künstliche Intelligenz - Konzeption und Entwicklung von Data-driven Products - Deep Learning - Self-Service im Data-Science-Umfeld - Data Privacy und Fragen zur digitalen Ethik - Customer Churn mit Keras/TensorFlow und H2O - Wirtschaftlichkeitsbetrachtung bei der Auswahl und Entwicklung von Data Science - Predictive Maintenance - Scrum in Data-Science-Projekten Zahlreiche Anwendungsfälle und Praxisbeispiele geben Einblicke in die aktuellen Erfahrungen bei Data-Science-Projekten und erlauben dem Leser einen direkten Transfer in die tägliche Arbeit.
This book presents the state of the art, challenges and future trends in automotive software engineering. The amount of automotive software has grown from just a few lines of code in the 1970s to millions of lines in today´s cars. And this trend seems destined to continue in the years to come, considering all the innovations in electric/hybrid, autonomous, and connected cars. Yet there are also concerns related to onboard software, such as security, robustness, and trust. This book covers all essential aspects of the field. After a general introduction to the topic, it addresses automotive software development, automotive software reuse, E/E architectures and safety, C-ITS and security, and future trends. The specific topics discussed include requirements engineering for embedded software systems, tools and methods used in the automotive industry, software product lines, architectural frameworks, various related ISO standards, functional safety and safety cases, cooperative intelligent transportation systems, autonomous vehicles, and security and privacy issues. The intended audience includes researchers from academia who want to learn what the fundamental challenges are and how they are being tackled in the industry, and practitioners looking for cutting-edge academic findings. Although the book is not written as lecture notes, it can also be used in advanced master´s-level courses on software and system engineering. The book also includes a number of case studies that can be used for student projects.
A revolution of intelligent machines, from self-driving cars to smart digital assistants, is now remaking our world, just as the Industrial Revolution remade the world of the 19th century. AI is used to diagnose and treat cancer, detect fraud, save energy, and make new discoveries. AI is not some science-fiction droid from the future. It´s right here, right now, and it´s changing our lives at lightning-fast speed. Many of these changes offer great promise, including freedom from drudgery, safer workplaces, better health care, and fewer language barriers. But others elicit worry - whether about jobs, data privacy, or the prospect of machines making biased decisions with no accountability. In AIQ, authors Nick Polson and James Scott, both experts in the field, show us how to make sense of these accelerating trends. This book is based on a simple premise: if you want to understand the modern world, you must learn about how these intelligent machines really work. AIQ will teach you how to speak the mathematical language of AI - but in an approachable manner, one anchored in storytelling rather than equations. Along the way, you will meet a fascinating cast of historical characters who have a lot to say about data, probability, and better thinking - and whose tried-and-true ideas are powering the AI revolution, as they play out in the modern age of big data. Finally, AIQ explains how these technologies can help you to overcome some of your own built-in cognitive weaknesses, giving you a chance to lead a life of greater happiness, efficiency, and fulfillment.
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation. Topics covered reflect new laws, regulations, and court decisions that address financial sector cybersecurity, the law of war as applied to cyberspace, and recently updated guidance for public companies´ disclosure of cybersecurity risks. This important guide: Provides a new appendix, with 15 edited opinions covering a wide range of cybersecurity-related topics, for students learning via the caselaw method Includes new sections that cover topics such as: compelled access to encrypted devices, New York´s financial services cybersecurity regulations, South Carolina´s insurance sector cybersecurity law, the Internet of Things, bug bounty programs, the vulnerability equities process, international enforcement of computer hacking laws, the California Consumer Privacy Act, and the European Union´s Network and Information Security Directive Contains a new chapter on the critical topic of law of cyberwar Presents a comprehensive guide written by a noted expert on the topic Offers a companion Instructor-only website that features discussion questions for each chapter and suggested exam questions for each chapter Written for students and professionals of cybersecurity, cyber operations, management-oriented information technology (IT), and computer science, Cybersecurity Law, Second Edition is the up-to-date guide that covers the basic principles and the most recent information on cybersecurity laws and regulations. JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He was a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.
This volume contains the proceedings of the 5th International Conference on Frontier Computing (FC 2016), Tokyo, Japan, July 13-15, 2016. This international meeting provided a forum for researchers to share current understanding of recent advances and emergence in information technology, science, and engineering, with themes in the scope of Communication Networks, Business Intelligence and Knowledge Management, Web Intelligence, and any related fields that further the development of information technology. The articles presented cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers report results of great academic potential and value, and in addition, indicate promising directions of research in the focused realm of this conference series. Readers, including students, academic researchers, and professionals, will benefit from the results presented in this book. It also provides an overview of current research and can be used as a guidebook for those new to the field.
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft AZ-900 Microsoft Azure Fundamentals certification exam. Exam Ref AZ-900 Microsoft Azure Fundamentals offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to demonstrate real-world mastery of cloud services and how they can be provided with Microsoft Azure. Coverage includes: Understanding cloud concepts Understanding core Azure services Understanding security, privacy, compliance, and trust Understanding Azure pricing and support Microsoft Exam Ref publications stand apart from third-party study guides because they: Provide guidance from Microsoft, the creator of Microsoft certification exams Target professional-level exam candidates with content focused on their needs, not ´´one-size-fits-all´´ content Streamline study by organizing material according to the exam´s objective domain (OD), covering one functional group and its objectives in each chapter Feature Thought Experiments to guide candidates through a set of ´´what if?´´ scenarios, and prepare them more effectively for Pro-level style exam questions Explore big picture thinking around the professional´s job role For more information on Exam AZ-900 and the Microsoft Certified Azure Fundamentals credential, visit