This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021.
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments.
The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017.
This book constitutes the proceedings of the 14th International Conference on Distributed Computing and Internet Technology, ICDCIT 2018, held in Bhubaneswar, India, in January 2018.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.
This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015.
This book constitutes the revised selected papers of the 14th International Symposium on Foundations and Practice of Security, FPS 2021, held in Paris, France, in December 2021.
The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019.
This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Mobile, Secure and Programmable Networking, held in Paris, France, in October 2020.
This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020.
This book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021.
This book constitutes the proceedings of the 13th International Conference on Distributed Computing and Internet Technology, ICDCIT 2017, held in Bhubaneswar, India, in January 2017.
This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge).
This book constitutes the proceedings of the 4th International Conference on Blockchain, ICBC 2021, held as part of SCF 2021, held as a Virtual Event, during December 10-14, 2021.
This book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016.
The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017.
The age of Advanced Air Mobility (AAM) is upon us, and in ushering new ways to connect and travel, this wave of technology has been compared to GPS and cloud computing.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2017, the 36th International Conference on Computer Safety, Reliability, and Security, held in Trento, Italy, in September 2017.
This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, which was supposed to be held in Quy Nhon, Vietnam, in November 2020, but the conference was held virtually due to the COVID-19 pandemic.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018.
This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities.
The two-volume set LNCS 10297 + 10298 constitutes the refereed proceedings of the Third International Conference on Human Aspects of IT for the Aged Population, ITAP 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017.
This book constitutes the refereed proceedings of the 17th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2021, held as a virtual event, in August 2021.
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016.
This volume constitutes the proceedings of the 11th International Conference on Cloud Computing, CLOUD 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, WA, USA, in June 2018.
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks.
This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2017, held in Bucharest, Romania, in October 2017.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2018, held in Valencia, Spain, in September 2018 under the sponsorship of the UNESCO Chair in Data Privacy.
This book constitutes the proceedings of the 20th International Conference on Speech and Computer, SPECOM 2018, held in Leipzig, Germany, in September 2018.
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018.
This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018.