This three-volume set LNAI 11670, LNAI 11671, and LNAI 11672 constitutes the thoroughly refereed proceedings of the 16th Pacific Rim Conference on Artificial Intelligence, PRICAI 2019, held in Cuvu, Yanuca Island, Fiji, in August 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
The 4 volume set LNCS 12112-12114 constitutes the papers of the 25th International Conference on Database Systems for Advanced Applications which will be held online in September 2020.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.
This book constitutes the proceedings of the 13th International Conference on Cloud Computing, CLOUD 2020, held as part of SCF 2020, during September 18-20, 2020.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications.
Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Apply different enterprise integration and processing strategies available with Pulsar, Apache's multi-tenant, high-performance, cloud-native messaging and streaming platform.
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021.
This book constitutes the proceedings of the 40th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2021, which took place in York, UK, in September 2021.
This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021.
This book constitutes selected and extended papers from the Second International Workshop on Deployable Machine Learning for Security Defense, MLHat 2021, held in August 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2020, held in Kitakyushu, Japan, in September 2020.
This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software.
This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017.
This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS).
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand.
This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015.
This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.