This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Internet Technology, ICDCIT 2019, held in Bhubaneswar, India, in January 2019.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage.
This book constitutes the workshop proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018, which took place in Faro, Portugal, in September 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018.
This book constitutes the proceedings of the 5th International Conference on the Internet of Vehicles, IOV 2018, which took place in Paris, France, in November 2018.
This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018.
This book constitutes revised papers from the seven workshops and one accompanying event which took place at the 21st International Conference on Business Information Systems, BIS 2018, held in Berlin, Germany, in July 2018.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Computational Data and Social Networks, CSoNet 2018, held in Shanghai, China, in December 2018.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book constitutes the thoroughly refereed post-workshop proceedings at PAKDD Workshops 2018, held in conjunction with the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2018, in Melbourne, Australia, in June 2018.
This book constitutes the proceedings of the First International Conference on Smart Multimedia, ICSM 2018, which was held in Toulon, France, in August 2018.
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book constitutes the refereed proceedings of the 13th International Symposium on Visual Computing, ISVC 2018, held in Las Vegas, NV, USA in November 2018.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018.
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018, held in Oslo, Norway, in November 2018.
The four-volume set LNCS 11256, 11257, 11258, and 11259 constitutes the refereed proceedings of the First Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2018, held in Guangzhou, China, in November 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018.
This book constitutes the refereed proceedings of the 5th International Conference on Future Data and Security Engineering, FDSE 2018, held in Ho Chi Minh City, Vietnam, in November 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018.
This book addresses what software architects and developers need to know in order to build applications based on blockchain technology, by offering an architectural view of software systems that make beneficial use of blockchains.
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018.
This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless Internet Communications, WWIC 2018, held in Boston, MA, USA, in June 2018.
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing.
This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018.
This book constitutes the proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, held in Tokyo, Japan, in October 2018.
In this book the authors first provide a comprehensive survey on the available studies on control, management, and optimization strategies in AC and DC microgrids.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta.
This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method.
This book constitutes the refereed proceedings of the 15th European Workshop on Computer Performance Engineering, EPEW 2018, held in Paris, France, in October 2018.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications.
The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud.
This book constitutes the revised selected papers from the 15th European Conference on Multi-Agent Systems, EUMAS 2017, and the 5th International Conference on Agreement Technologies, AT 2017, held in Evry, France, in December 2017.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book covers reliability assessment and prediction of new technologies such as next generation networks that use cloud computing, Network Function Virtualization (NVF), Software Defined Network (SDN), Next Generation Transport, Evolving Wireless Systems, Digital VoIP Telephony, and Reliability Testing techniques specific to Next Generation Networks (NGN).
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT.