Focusing on the theory and applications of point processes, Point Processes for Reliability Analysis naturally combines classical results on the basic and advanced properties of point processes with recent theoretical findings of the authors.
This book offers a comprehensive account of energetic materials, including their synthesis, computational modeling, applications, associated degradation mechanisms, environmental consequences and fate and transport.
This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications.
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings.
This book analyses the relationships among product safety strategy and culture, concurrent engineering, new product development (NPD) processes and product safety performance.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
This book addresses the hazard of gas explosions in sealed underground coal mines, and how the risk of explosion can be assessed, modeled, and mitigated.
Featuring a detailed analysis of current approval requirements and the relevant safety assessment methods for gas cylinders in general and with main focus on composite cylinders for storing compressed natural gas and hydrogen, this book demonstrates how current regulations and standards limit the ability to reduce cost and weight.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets.
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features should provide for highest reliability.
This textbook is for readers new or returning to the practice of optimization whose interest in the subject may relate to a wide range of products and processes.
This book contains an inclusive compilation of perspectives about the Arctic Ocean with contributions that extend from Indigenous residents and early career scientists to Foreign Ministers, involving perspectives across the spectrum of subnational-national-international jurisdictions.
Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core.
This book presents a systemic view of nanophenomena in terms of disordered condensed media with characteristics arising at various hierarchical levels from nanoagents/nanoparticles through multiple technological interfaces to the creation of micro- or mesostructures with essential nanodimensional effects.
This book provides readers a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for electronic warfare and defensive countermeasures in military contexts.
Designed as an introduction for both advanced students in aerospace engineering and existing aerospace engineers, this book covers both engineering theory and professional practice in establishing the airworthiness of new and modified aircraft.
The ground segment is the fundamental backbone of every satellite project, yet it is usually not visible to the public or the end user of a satellite service.
This book is focused on the analysis and modelling of resilience, robustness, and vulnerability of transport systems and their complement: reliability.
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication.
This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack.
This book aspires to face the challenge of analyzing with due academic rigor, always in the paradigm of security and advanced sciences, but without forgetting the ethical questions that our world raises every day.
This book contains an inclusive compilation of perspectives about the Arctic Ocean with contributions that extend from Indigenous residents and early career scientists to Foreign Ministers, involving perspectives across the spectrum of subnational-national-international jurisdictions.
This hands-on textbook introduces physics and nuclear engineering students to the experimental and theoretical aspects of fission physics for research and applications through worked examples and problem sets.
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students.
This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems.
The book analyses a broad range of relevant aspects as the outer space and cyber space domain do not only present analogies but are also strongly interrelated.
This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats.