The book explores comprehensive demonstration of the performance analytics following the implementation of the authentication and fraud detection system strategies.
The book explores comprehensive demonstration of the performance analytics following the implementation of the authentication and fraud detection system strategies.
The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks.
The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks.
This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024.
This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024.
This book constitutes the refereed proceedings of the 6th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2024, held in Munster, Germany, during September 2-4, 2024.
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2023), held in Glocal University, Saharanpur, Uttar Pradesh, India, during 28-29 November 2023.
This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2023), held in Glocal University, Saharanpur, Uttar Pradesh, India, during 28-29 November 2023.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.
This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024.
This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management.
This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.
This comprehensive handbook explores how artificial intelligence is transforming cybersecurity training, with a specific focus on practical implementation strategies for organizations.
This book addresses fundamental concepts and practical implementations in cloud computing environments, focusing on load balancing and resource management.
This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024.
This book constitutes the refereed proceedings of the 6th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2024, held in Munster, Germany, during September 2-4, 2024.
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs.
This book discusses the design and evaluation of Physically Unclonable Functions (PUFs) that are suitable for securing highly energy constrained devices, while at the same time classifying the many applications and devices that would benefit from various PUF designs.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
This book constitutes thoroughly refereed post-conference proceedings of the 8th International Symposium on Intelligent Informatics (ISI 2023), December 18-20, 2023, Bangalore, India.
This book constitutes thoroughly refereed post-conference proceedings of the 8th International Symposium on Intelligent Informatics (ISI 2023), December 18-20, 2023, Bangalore, India.
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
Digital twin technologies, currently at the forefront of development, play a crucial role in integrated systems, industrial design, manufacturing, data analytics, and decision-making processes.
Digital twin technologies, currently at the forefront of development, play a crucial role in integrated systems, industrial design, manufacturing, data analytics, and decision-making processes.
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.