The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The book presents the proceedings of the 12th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2024), held at Intelligent Systems Research Group (ISRG), London Metropolitan University, London, United Kingdom, during June 6-7, 2024.
This book is the 2nd volume of proceedings of the 1st Smart Nuclear Power Technology Forum and the 8th China Nuclear Power Plant Digital Technology and Application Seminar held in Shenzhen, China in June 2024.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 37th International Conference on Advanced Information Systems Engineering, CAiSE 2025, which was held in Vienna, Austria, during June 16-20, 2025.
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security.
Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The book "e;AI-Enabled Healthcare Security: Safeguarding Patient Data and Improving Outcomes"e; focuses on the role of artificial intelligence in enhancing healthcare security and improving patient outcomes.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book constitutes the refereed proceedings of the 18th International Conference on Network and System Security, NSS 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024.
The cyber infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.
This book constitutes the proceedings of the 20th International Conference on Foundations of Computer Science, FCS 2024, and the 20th International Conference on Frontiers in Education, FECS 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
This Festschrift, dedicated to Wolfgang Reif on the occasion of his 65th birthday, collects contributions written by many of his closest research colleagues and many of his former students.
This book constitutes the refereed proceedings of two long-running events held along with the CAiSE conference and related to the areas of enterprise, business-process and information systems modeling: - the 26th International Conference on Business Process Modeling, Development and Support, BPMDS 2025 and - the 30th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2025.
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
This book offers a novel multi-portfolio approach and stochastic programming formulations for modeling and solving contemporary supply chain risk management problems.
This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning.