Computer Safety, Reliability, and Security
This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025. The 15 full papers included in these proceedings were carefully reviewed and selected from 79 submissions. They were organized in topical sections as follows: Safety Arguments/Cases; Data Sets and Dependability Properties; Testing and Complex Environments; Methodologies (1) - Safety Design and Risk Assessment; and Methodologies (2) Machine Learning and Large Language.
Computer Safety, Reliability, and Security. Safecomp 2025 Workshops
This book constitutes the proceedings of the Workshops held in conjunction with the 44th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2025, which took place in Stockholm, Sweden, during September 2025. The 43 papers included in this book were carefully reviewed and selected from a total of 61 submissions to the following six workshops: - CoC3CPS 2025, Co-Design of Communication, Computing and Control in Cyber-Physical Systems - DECSoS 2025 - 20th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems - SASSUR 2025 - 12th International Workshop on Next Generation of System Assurance Approaches for Critical Systems - SENSEI 2025 - 4th International Workshop on Safety and Security Interaction - SRToITS 2025 - 2nd International Workshop on Safety/Reliability/Trustworthiness of Intelligent Transportation Systems - WAISE 2025 - 8th International Workshop on Artificial Intelligence Safety Engineering
Advanced Technologies in Electronics, Communications and Signal Processing
This book LNICST 619 constitutes the proceedings of the First EAI International Conference on Advanced Technologies in Electronics, Communications and Signal Processing, ICATECS 2024, held in Hyderabad, India, during July 26-27, 2024. The 65 full papers were carefully reviewed and selected from 210 submissions. They were categorized under the topical sections as follows: Wireless Communication and IoT; RF and Signal processing; VLSI System Design; Machine Learning and Deep Learning Applications.
Cyber Defense
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices Cyber Defense is a comprehensive cyber-hygiene guide that provides an in-depth exploration of essential practices to secure one's digital life. The book begins with an introduction to cyber hygiene, emphasizing its importance and the foundational concepts necessary for maintaining digital security. It then dives into financial security, detailing methods for protecting financial accounts, monitoring transactions, and compartmentalizing accounts to minimize risks. Password management and multifactor authentication are covered, offering strategies for creating strong passwords, using password managers, and enabling multifactor authentication. With a discussion on secure internet browsing practices, techniques to avoid phishing attacks, and safe web browsing, this book provides email security guidelines for recognizing scams and securing email accounts. Protecting personal devices is discussed, focusing on smartphones, tablets, laptops, IoT devices, and app store security issues. Home network security is explored, with advice on securing home networks, firewalls, and Wi-Fi settings. Each chapter includes recommendations for success, offering practical steps to mitigate risks. Topics covered in Cyber Defense include: Data protection and privacy, providing insights into encrypting information and managing personal data Backup and recovery strategies, including using personal cloud storage services. Social media safety, highlighting best practices, and the challenges of AI voice and video Actionable recommendations on protecting your finances from criminals Endpoint protection, ransomware, and malware protection strategies, alongside legal and ethical considerations, including when and how to report cyber incidents to law enforcement Cyber Defense is an essential guide for anyone, including business owners and managers of small and medium-sized enterprises, IT staff and support teams, and students studying cybersecurity, information technology, or related fields.