This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches.
This volume constitutes the proceedings of the Second International Conference on Reliability, Safety and Security of Railway Systems, RRSRail 2017, held in Pistoia, Italy, in November 2017.
This volume constitutes the refereed post-conference proceedings of the First IFIP TC 5 DCDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2016, held in Sofia, Bulgaria, in November 2016.
This book constitutes the refereed proceedings of the Third International Conference on Geometric Science of Information, GSI 2017, held in Paris, France, in November 2017.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017.
This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2017, held in Messina, Italy, in September 2017.
This book constitutes the refereed proceedings of the 13th International Joint Conference on E-Business and Telecommunications, ICETE 2016, held in Lisbon, Portugal, in July 2016.
This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017.
This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in June 2017.
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017.
This book constitutes the proceedings of the Second International Conference on Cloud, Networking for IoT Systems, CN4IoT 2017, and the Second EAI International Conference on ICT Infrastructures and Services for Smart Cities, IISSC 2017, held in Brindisi, Italy, in April 2017.
This book constitutes the refereed proceedings of the 9th International Conference on Data-Driven Innovation, ICT Innovations 2017, held in Skopje, Macedonia, in September 2017.
This book constitutes the refereed proceedings of the 17th International Conference on Runtime Verification, RV 2017, held in Seattle, WA, USA, in September 2017.
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field.
This book contains a selection of the best papers that were presented at the 28th edition of the annual Benelux Conference on Artificial Intelligence, BNAIC 2016.
This book constitutes the joint refereed proceedings of the 17th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2017, the 10th Conference on Internet of Things and Smart Spaces, ruSMART 2017.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th Annual Privacy Forum, APF 2017, held in Vienna, Austria, in June 2017.
This book constitutes the refereed post-conference proceedings of the 9th International Conference on Communication Systems and Networks, COMSNETS 2017, held in Bengaluru, India, in January 2017.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.
This book constitutes the refereed conference proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017.
This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2017, the 36th International Conference on Computer Safety, Reliability, and Security, held in Trento, Italy, in September 2017.
This book constitutes the refereed proceedings of the 36th International Conference on ComputerSafety, Reliability, and Security, SAFECOMP 2017, held in Trento, Italy, in September 2017.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2017, held in Prague, Czech Republic, in August 2017.
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods.
This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017.
This book constitutes the proceedings of the 15th International Conference on Smart Homes and Health Telematics, ICOST 2017, held in Paris, France, in August 2017.
This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 33rd International Conference on Advanced Information Systems Engineering, CAiSE 2021, which was held during June 28-July 2, 2021.
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017.
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017.
This two volume set LNCS 10438 and LNCS 10439 constitutes the refereed proceedings of the 28th International Conference on Database and Expert Systems Applications, DEXA 2017, held in Lyon, France, August 2017.
This two volume set LNCS 10438 and LNCS 10439 constitutes the refereed proceedings of the 28th International Conference on Database and Expert Systems Applications, DEXA 2017, held in Lyon, France, August 2017.
This volume constitutes the refereed post-conference proceedings of the International Conference on Theoretical Computer Science and Discrete Mathematics, held in Krishnankoil, India, in December 2016.
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017.