This book features selected papers from the 11th International Conference on Mathematics and Computing (ICMC 2025), held at IIT Bhilai, India during January 09 – 11, 2025.
This book explores the concept, architecture, and applications of distributed edge IoT, showcasing how it enhances real-time data processing, analytics, and decision-making at the network's edge.
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on Information Technology and Artificial Intelligence (ITAI 2025), organized by Soft Computing Research Society held in Gurgaon, India, from January 24 – 25, 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book includes original, peer reviewed research articles from 6th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2025), held in March 28–29, 2025 at CMR Institute of Technology, Hyderabad, India.
This book includes original, peer reviewed research articles from 6th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2025), held in March 28–29, 2025 at CMR Institute of Technology, Hyderabad, India.
This book includes original, peer reviewed research articles from 6th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2025), held in March 28–29, 2025 at CMR Institute of Technology, Hyderabad, India.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography, SAC 2025, held in Toronto, ON, Canada, in August 2025.
This book constitutes the proceedings of the International conference on AI Revolution: Research, Ethics and Society, AIR-RES 2025, held in Las Vegas, Navada, USA, during April 14–16, 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book presents selected papers from NIELIT’s International Conference on Communication, Electronics, and Digital Technology (NICEDT 2025) held at NIELIT Ropar, Punjab, India, during 14–15 February 2025.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book constitutes the proceedings of the 8th International Conference on Blockchain – ICBC 2025, held as part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
The Six-volume proceedings set LNCS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
The Six-volume proceedings set LNCS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
The Six-volume proceedings set CCIS 2473 and 2478 constitutes the refereed proceedings of the 9th International Conference on Computer Vision and Image Processing, CVIP 2024, held in Chennai, India, during December 19–21, 2024.
This book constitutes the refereed proceedings of the 9th International Conference on Cognitive Computing, ICCC 2025, Held as Part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the proceedings of the 8th International Conference on Blockchain – ICBC 2025, held as part of the Services Conference Federation, SCF 2025, held in Hong Kong, during September 27–30, 2025.
This book constitutes the refereed proceedings of the 10th International Conference on Internet of Things – ICIOT 2025, held as part of the Services Conference Federation, SCF 2025, in Hong Kong, China during September 27–30, 2025.
This book constitutes the refereed proceedings of the 10th International Conference on Internet of Things – ICIOT 2025, held as part of the Services Conference Federation, SCF 2025, in Hong Kong, China during September 27–30, 2025.
This book constitutes the proceedings of the 32nd International Conference on Web Services – ICWS 2025, held as Part of the Services Conference Federation, SCF 2025 in Hong Kong, China during September 27–30, 2025.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14–18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This volume constitutes revised selected papers from the workshops that took place in conjunction with the 29th International Conference on Financial Cryptography and Data Security, FC 2025, Miyakojima, Japan, during April 14-18, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025, held in Huatulco, Mexico, during November 3–7, 2025.
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS 2025, held in Hangzhou, China, on February 24, 2025.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This volume constitutes revised selected papers of the 25th International Conference on Web Engineering, ICWE 2025, held in Delft, the Netherlands, during June 30–July 3, 2025.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.