This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT).
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book constitutes the proceedings of the 11th International Congress on Telematics and Computing, WITCOM 2022, held in Cancun, Mexico, in November 2022.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference.
This book constitutes the proceedings of the 4th International Conference on Science of Cyber Security, SciSec 2022, held in Matsu, Japan in August 2022.
This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were held as part of the 20th International Conference on Business Process Management, BPM 2022, which took place in Munster, Germany, during September 11-15, 2022.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS).
This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSEC 2022, which took place as a hybrid event in Tokyo, Japan, in August/September 2022.
This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30-31, 2022, hosted in online mode in Bandung, Indonesia.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model).
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.
This book constitutes the refereed proceedings of the 4th International Conference on Intelligent Technologies and Applications, INTAP 2021, held in Grimstad, Norway, October 11-13, 2021.
This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021.
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June - July 2021.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
This book constitutes selected papers from the 24th International Conference on Information Security and Cryptology, ICISC 2021, held in Seoul, South Korea, in December 2021.
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems.