Overview
- Includes detailed revised, extended papers from CYBERWORLDS 2016
- Covers applicational areas ranging from EEG-based stress monitoring to web defacement and Content regeneration
- Analyses attitudes towards using software as a weapon
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10830)
Part of the book sub series: Transactions on Computational Science (TCOMPUTATSCIE)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (8 chapters)
Keywords
About this book
This, the 32nd issue of the Transactions on Computational Science, focusses on cybersecurity and biometrics. The eight detailed papers cover the following topics: Multimodal Warnings for Distracted Smartphone Users on the Move; EEG-Based Mental Workload and Stress Monitoring of Crew Members in a Maritime Virtual Simulator; Detecting Web Defacement and Enabling Web-Content Regeneration; Software as a Weapon in the Context of (Inter)national Security; Multi-user Architecture and Multi-player Games; An Adaptive Discrete Wavelet Transform Based Face Recognition Approach; Synthesizing Images of Imagined Faces Based on Relevance Feedback; and Neurofeedback Training to Enhance the Focused Attention of Elite Rifle Shooters.
Editors and Affiliations
Bibliographic Information
Book Title: Transactions on Computational Science XXXII
Book Subtitle: Special Issue on Cybersecurity and Biometrics
Editors: Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-56672-5
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag GmbH Germany, part of Springer Nature 2018
Softcover ISBN: 978-3-662-56671-8Published: 13 March 2018
eBook ISBN: 978-3-662-56672-5Published: 06 March 2018
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 121
Number of Illustrations: 52 b/w illustrations
Topics: Security, Artificial Intelligence, Information Systems Applications (incl. Internet), Image Processing and Computer Vision