This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.
This two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019.
The two volume set LNCS 11678 and 11679 constitutes the refereed proceedings of the 18th International Conference on Computer Analysis of Images and Patterns, CAIP 2019, held in Salerno, Italy, in September 2019.
The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.
This book constitutes the revised selected papers from the 14th International Conference on Risks and Security of Internet and Systems, CRiSIS 2019, held in Hammamet, Tunisia, in October 2019.
The four-volume set LNCS 11583, 11584, 11585, and 11586 constitutes the proceedings of the 8th International Conference on Design, User Experience, and Usability, DUXU 2019, held as part of the 21st International Conference, HCI International 2019, which took place in Orlando, FL, USA, in July 2019.
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018.
This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019.
This book constitutes the refereed proceedings of the 9th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2019, held in Gandhinagar, India, in December 2019.
The book explores technological advances in the fourth industrial revolution (4IR), which is based on a variety of technologies such as artificial intelligence, Internet of Things, machine learning, big data, additive printing, cloud computing, and virtual and augmented reality.
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018.
This book constitutes the refereed proceedings of the 5th International Conference on Future Network Systems and Security, FNSS 2019, held in Melbourne, Australia, in November 2019.
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This book constitutes the revised selected papers from the 15th European Conference on Multi-Agent Systems, EUMAS 2017, and the 5th International Conference on Agreement Technologies, AT 2017, held in Evry, France, in December 2017.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018.
This book covers reliability assessment and prediction of new technologies such as next generation networks that use cloud computing, Network Function Virtualization (NVF), Software Defined Network (SDN), Next Generation Transport, Evolving Wireless Systems, Digital VoIP Telephony, and Reliability Testing techniques specific to Next Generation Networks (NGN).
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network.
This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology.
This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime.
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This book constitutes the refereed conference proceedings of the Second International Conference on Emerging Technologies in Computing, iCEtiC 2019, held in London, UK, in August 2019.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019.
This book contains the refereed proceedings of the 14th International Conference on Knowledge Management in Organizations, KMO 2019, held in Zamora, Spain, in July 2019.
This book constitutes the refereed proceedings of the 33rd Canadian Conference on Artificial Intelligence, Canadian AI 2020, which was planned to take place in Ottawa, ON, Canada.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM 2019, held in Ho Chi Minh City, Vietnam, in August 2019.
This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.
This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022.
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent authentication framework for IoMT mobile devices for extracting bioelectrical signals, security audit in terms of vulnerability analysis to protect the electronic medical records in healthcare system using AI, classification using CNN a multi-face recognition attendance system with anti-spoofing capability, challenges in face morphing attack detection, a dimensionality reduction and feature-level fusion technique for morphing attack detection (MAD) systems, findings and discussion on AI-assisted forensics, challenges and open issues in the application of AI in forensics, a terrorist computational model that uses Baum-Welch optimization to improve the intelligence and predictive accuracy of the activities of criminal elements, a novel method for detecting security violations in IDSs, graphical-based city block distance algorithm method for E-payment systems, image encryption, and AI methods in ransomware mitigation and detection.