This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way th…
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full…
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, pr…
This book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. I…
This open access book looks at how a democracy can devolve into a post-factual state. The media is being flooded by populist narratives, fake news, conspiracy theories and make-believe. Misinfor…
What role does gender play in scientific research and the development of technologies? This book provides methodological expertise, research experiences and empirical findings in the dynamic field …
This volume contains the papers presented a t POST 2019, the 8th Conference on Principles of Security and Trust, held April 11, 2019, in Prague, Czech Republic, as part of ETAPS. Principles of Secu…
This volume contains the papers presented at the 22nd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS), which took place in Prague during April 8– …
This open access two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2020, which took place i…
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust.…