Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book offers a comprehensive overview of the state-of-the-art techniques for monitoring water quality, leveraging artificial intelligence (AI), IoT technologies, and autonomous vehicles to offer groundbreaking approaches to environmental protection.
This book discusses how Cloud, Fog, and Edge computing, alongside federated learning and blockchain, are revolutionizing healthcare systems by addressing the challenges of data management, privacy, and efficiency.
This book discusses how Cloud, Fog, and Edge computing, alongside federated learning and blockchain, are revolutionizing healthcare systems by addressing the challenges of data management, privacy, and efficiency.
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI security.
The cyber infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
This book discusses how Artificial Intelligence (AI) and Internet of Things (IoT) technologies can be utilized to optimize orchard production, management, and conservation to achieve sustainable agriculture development goals.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book discusses how Artificial Intelligence (AI) and Internet of Things (IoT) technologies can be utilized to optimize orchard production, management, and conservation to achieve sustainable agriculture development goals.
This book offers a comprehensive overview of buildings' digital information security, focusing on various phases of building projects and their associated challenges.
This book focuses on the integration of Artificial Intelligence (AI) technology for securing IoT next systems, exploring a comprehensive collection of recent techniques and strategies aimed at protecting these complex networks.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.
This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
This book presents a comprehensive exploration of federated learning and its transformative potential across industries, focusing on privacy-preserving, decentralized AI solutions.
This book presents a comprehensive exploration of federated learning and its transformative potential across industries, focusing on privacy-preserving, decentralized AI solutions.
This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025.
This book constitutes the refereed proceedings of the 44th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2025, held in Stockholm, Sweden, during September 2025.
This Second Edition introduces the technical features that make up blockchain technology today, including the numerous changes that have occurred since the publication of the prior edition.
This Second Edition introduces the technical features that make up blockchain technology today, including the numerous changes that have occurred since the publication of the prior edition.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025, which took place in Stockholm, Sweden, in August 2025.
This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013.
This book constitutes the proceedings of the BPM 2025 Responsible BPM Forum, Process Technology Forum, and Educators Forum held at the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, during September 2025.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.