Developments and advances in defense and security : proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018) /: proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). (2018)
- Record Type:
- Book
- Title:
- Developments and advances in defense and security : proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018) /: proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018). (2018)
- Main Title:
- Developments and advances in defense and security : proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2018)
- Other Titles:
- MICRADS 2018
- Further Information:
- Note: Álvaro Rocha, Teresa Guarda, editors.
- Editors:
- Rocha, Álvaro
Guarda, Teresa - Other Names:
- Multidisciplinary International Conference of Research Applied to Defense and Security
- Contents:
- Intro; Preface; Organization; Honorary Chair; Honorary Co-chair; General Chairs; Local Organizing Chair; Scientific Committee; Contents; Cybersecurity and Cyberdefense; Empirical Study of the Application of Business Intelligence (BI) in Cybersecurity Within Ecuador: A Trend Away from Reality; Abstract; 1 Introduction; 2 Background; 2.1 Business Intelligence Systems and Their Field of Application; 2.2 Management of Large Volumes of Data in Cybersecurity; 2.3 Cybersecurity and Visual Representation of Patterns Based on Large Volumes of Data; 2.4 Cybersecurity and Its Trend in Ecuador. 3 Research Methodology4 Execution and Results; 4.1 Execution; 4.2 Results; 5 Discussion and Conclusions; 6 Future Works; References; Situational Status of Global Cybersecurity and Cyber Defense According to Global Indicators. Adaptation of a Model for Ecuador; Abstract; 1 Introduction; 2 Initiatives to Measure Countries' Commitment to Cybersecurity Issues; 2.1 Global Cybersecurity Index (GCI); 2.2 North Atlantic Treaty Organization (NATO); 2.3 Group of Eight (G8); 2.4 Cybersecurity, Cyber Defense, Cyberwar, and Cybercrime; 3 Methodology to Perform the Comparative Analysis. 3.1 Bibliographic Research and Determination of Analysis Criteria3.2 Tabulation and Normalization of Data Extracted from ITU; 3.3 Analysis of Data; 3.4 Statistical Analysis of Data of the Selected Countries; 4 Evaluation Results and Discussion; 4.1 Evaluation with the Established Criteria; 4.2 Model Resulting from the PerformedIntro; Preface; Organization; Honorary Chair; Honorary Co-chair; General Chairs; Local Organizing Chair; Scientific Committee; Contents; Cybersecurity and Cyberdefense; Empirical Study of the Application of Business Intelligence (BI) in Cybersecurity Within Ecuador: A Trend Away from Reality; Abstract; 1 Introduction; 2 Background; 2.1 Business Intelligence Systems and Their Field of Application; 2.2 Management of Large Volumes of Data in Cybersecurity; 2.3 Cybersecurity and Visual Representation of Patterns Based on Large Volumes of Data; 2.4 Cybersecurity and Its Trend in Ecuador. 3 Research Methodology4 Execution and Results; 4.1 Execution; 4.2 Results; 5 Discussion and Conclusions; 6 Future Works; References; Situational Status of Global Cybersecurity and Cyber Defense According to Global Indicators. Adaptation of a Model for Ecuador; Abstract; 1 Introduction; 2 Initiatives to Measure Countries' Commitment to Cybersecurity Issues; 2.1 Global Cybersecurity Index (GCI); 2.2 North Atlantic Treaty Organization (NATO); 2.3 Group of Eight (G8); 2.4 Cybersecurity, Cyber Defense, Cyberwar, and Cybercrime; 3 Methodology to Perform the Comparative Analysis. 3.1 Bibliographic Research and Determination of Analysis Criteria3.2 Tabulation and Normalization of Data Extracted from ITU; 3.3 Analysis of Data; 3.4 Statistical Analysis of Data of the Selected Countries; 4 Evaluation Results and Discussion; 4.1 Evaluation with the Established Criteria; 4.2 Model Resulting from the Performed Analysis; 5 Conclusions; References; Applicability of Cybersecurity Standards in Ecuador -- A Field Exploration; Abstract; 1 Introduction; 2 Organizations of Standardization and Standards Related to Cyber Security; 2.1 Standardization Organizations. 2.2 Standards and Related Specifications2.3 Analysis of the Scope and Coverage of Related Standards; 3 Applicability of Cybersecurity Standards in Ecuador, Field Exploration; 4 Evaluation Results and Discussion; 4.1 Description of the Results of the Field Exploration; 4.2 Discussion; 4.3 Applicability, A Cross Analysis; 5 Conclusions and Future Work; Acknowledgment; References; Computer Vision in Military Applications; Mathematical Models Applied in the Design of a Flight Simulator for Military Training; Abstract; 1 Introduction; 2 Related Works; 3 Theoretical Framework. 3.1 Mathematical Model of the Basic Forces of an Airplane3.2 Rotational Movements of the Airplane; 4 Research Design and Implementation; 4.1 Mathematical Model of the Front Velocity; 4.2 Mathematical Model of the Vertical Velocity; 4.3 Mathematical Model of Lateral Velocity; 4.4 Mathematical Model of the Turns of the Plane; 4.5 Explanation of the Main Equations and Functions of the Flight Simulator; 5 Experimental Results and Discussion; 6 Conclusions and Future Work; References; Autonomous Video Surveillance Application Using Artificial Vision to Track People in Restricted Areas; Abstract. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 355/.03
Engineering
National security -- Congresses
Computer security -- Congresses
Military policy -- Congresses
HISTORY -- Military -- Other
TECHNOLOGY & ENGINEERING -- Military Science
Computer security
Military policy
National security
Artificial Intelligence (incl. Robotics)
Computers -- Intelligence (AI) & Semantics
Artificial intelligence
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319786056
3319786059
3319786040
9783319786049 - Related ISBNs:
- 9783319786049
- Notes:
- Note: Online resource; title from PDF title page (EBSCO, viewed April 11, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367539
- Ingest File:
- 01_345.xml