This collection of research papers provides extensive information on deploying services, concepts, and approaches for using open linked data from libraries and other cultural heritage institutions.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT).
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.
Transparent Artificial Intelligence (AI) systems facilitate understanding of the decision-making process and provide opportunities in various aspects of explaining AI models.
Explore network automation with Ansible by configuring network infrastructure fast, reliably, and repeatedly, all while creating a lab utilizing open and available network operating systems and toolsKey FeaturesDesign, build, and automate network devices and cloud networking resources using AnsibleOrchestrate workflows with AWX and integrate Nautobot as a Source of TruthStart with Event-Driven Ansible and manage Terraform workflows seamlesslyPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNetwork Automation Cookbook, now in its second edition, is your essential guide to building robust network automation workflows across modern hybrid infrastructures.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022.
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022.
This book gives an overview of existing models that cover the whole lifecycle of an IoT application, ranging from its design, implementation, deployment, operation, and monitoring to its final termination and retirement.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This book constitutes the proceedings of the 11th International Congress on Telematics and Computing, WITCOM 2022, held in Cancun, Mexico, in November 2022.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference.
This book constitutes the proceedings of the 4th International Conference on Science of Cyber Security, SciSec 2022, held in Matsu, Japan in August 2022.
This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022.
This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were held as part of the 20th International Conference on Business Process Management, BPM 2022, which took place in Munster, Germany, during September 11-15, 2022.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.
This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022.
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS).